Please turn on your JavaScript for this page to function normally.
Head
How attackers exploit end-users’ psychology

At RSA Conference 2015, Proofpoint released the results of its annual study that details the ways attackers exploit end-users’ psychology to circumvent IT security.Last …

Cyber crooks go after enterprise millions with Dyre malware, social engineering

“An experienced and resource-backed cybercrime gang” is using the relatively new Dyre/Dyreza banking Trojan coupled with effective social engineering to steal …

How cybercriminals hack our brains

Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually resulting in the loss of money …

The psychology of Facebook scam victims

A two-year study of over 850,000 Facebook scams by antivirus software provider Bitdefender has revealed that scammers have infected millions of users with the same repackaged …

iCloud wasn’t hacked, says Apple

Apple has released a statement denying that iCloud was hacked to steal nude photos of celebrities. “When we learned of the theft, we were outraged and immediately …

Social Engineering Penetration Testing

We know that the human element is often the weakest link in the security chain, and that attackers - whether they are after money, user information, corporate or state secrets …

A look at advanced targeted attacks through the lens of a human-rights NGO, World Uyghur Congress

In my capacity as an academic researcher at Northeastern University, I collaborated with computer scientists Stevens Le Blond, Adina Uritesc and Cedric Gilbert at the Max …

The psychology of phishing

Phishing emails are without a doubt one of the biggest security issues consumers and businesses face today. Cybercriminals no longer send out thousands of emails at random …

IT security training: Be proactive

Security is a fast paced industry. You only need to use the Internet for a short time to understand how and why the activities of digital criminals pose a real and significant …

French orgs targeted with social engineering attacks

Over the last year, Symantec researchers have been following and warning about exceptionally effective and sophisticated malware delivery / phishing campaigns that have been …

Infographic: A phishing email’s route through the corporate network

For years, even decades, computer security has been seen as a technical problem that requires a technical solution. In recent years, enterprises have plowed billions of …

Sogeti social engineering challenge at HITB Haxpo

For the third year in a row Sogeti organizes the social engineering challenge during Hack In The Box Amsterdam. In 2012 and 2013 they asked contestants to show weaknesses in …

Don't miss

Cybersecurity news