Social Engineering

Social Engineering news, information, and how-to advice

phishing threat

Back to school, part 2: no whaling allowed!

5 security safeguards to keep the CEO out of hot water.

p1240307 6

Office 365 phishing – A quick look at a recent example

On Thursday, an interesting email showed up in my inbox. The message says there are emails pending, because I've used 98-percent of my storage space. In order to fix this, I needed to download and save the attached configuration. The...

Quantum Break

Chinese citizen tries to steal advanced robotic technology IP

Medrobotics' CEO caught Dong Liu in the company's conference room attempting to steal advanced robotic intellectual property.

knife lanyard knot untangle rope

Mimecast’s newly discovered email exploit isn’t a vulnerability, it’s a feature

Mimecast, a Boston-based email security firm, claims to have discovered a new email exploit. The exploit itself centers on the fact that an attacker who sends an HTML-based email linking to an external CSS file can "edit any text in...

tom pendergast in the alps

Take a vacation—just not from cybersecurity best practices!

If you’re a person with privileged access in a company—executives, yes, but IT and finance and more—a criminal who has been watching your company and watching you personally could easily gather enough clues about you and your company...

cyberattack laptop arrows war fight

The 5 types of cyber attack you're most likely to face

Don't be distracted by the exploit of the week. Invest your time and money defending against the threats you're apt to confront.

phishing threat

Attackers experimenting with CVE-2017-0199 in recent phishing attacks

Researchers at Trend Micro and Cisco's Talos have identified a new wave of Phishing attacks leveraging CVE-2017-0199, a previously-patched remote code execution vulnerability in the OLE (Windows Object Linking and Embedding) interface...

eliminate insider threats 1

IT's 9 biggest security threats

As this list of the biggest security threats shows, hacking has evolved from a one-person crime of opportunity to an open market of sophisticated malware backed by crime syndicates and money launderers.

socengentry

What is social engineering? How criminals take advantage of human behavior

Social engineering is essentially the art of gaining access to buildings, systems or data by exploiting human psychology, rather than by breaking in or using technical hacking techniques. Here are answers to some frequently asked...

mobile security phones

Five new threats to your mobile security

Cyber criminals are stepping up their attacks on mobile devices with new weapons and variations on old ones.

3 phishing

11 tips to prevent phishing

From rewarding employees for savvy security smarts, to showing them how breaches are relevant to their every-day duties, we've got the phishing prevention tips you need.

group of millennials using mobile devices

8 ways millennials impact your security awareness program

The millennial generation has arrived. Is your awareness program up to the challenge?

chinese espionage

U.S. defense contractor arrested for giving U.S. secrets to Chinese operatives

Kevin Mallory, a U.S. defense contractor, was arrested for allegedly passing secret and top secret U.S. documents to Chinese intelligence.

telephone operators 1952

Developer uses code to get revenge on tech support and IRS scammers

Tech support and IRS scams have become as common as random emails proclaiming that you've won the lottery, or emails from prince in some foreign land who wants to share their wealth. One potential victim used a bit of code to take...

phishing cyber theft hacked scam

New social media scams: Can you tell friend from foe?

Scams on social networks are nothing new, but they're constantly changing to take advantage of the latest apps, trends and news. As with all social engineering scams, the best defense is a skeptical user.

volcano

CEO lies, commits fraud, and yes, the startup craters

WrkRiot CEO Isaac Choi was indicted for defrauding the employees of his tech startup.

peeling back good times ahead bright future

Imagining frictionless authentication

Passwords are lame. The username/password combination is outdated and is now the weakest link in security. There's got to be a better way, right?

submarine periscope 101722825

China continues to steal high-tech trade secrets

China continues to steal trade secrets. Six were arrested and seven charged with theft of Trelleborg's dual-use undersea technology.

money ransom

Ransomware damages rise 15X in 2 years to hit $5 billion in 2017

Ransomware damage costs are expected to hit $5 billion in 2017. To keep from becoming a victim, implement these six cybersecurity strategies.

phishing threat

Be wary of fake WannaCry fixes

When the WannaCry malware hit, many users were scrambling for fixes -- but some of the proffered solutions were actually just more malware, in disguise

Load More