social engineering
When scammers socialize
A sophisticated, seemingly broadly orchestrated online scam that promises bogus prizes like iPads or gift cards in order to dupe Internet users into giving up their …
Facebook tool automates syphoning of user data
A group of security researchers has developed a proof-of-concept Java-based tool that could allow malicious individuals to automatize the syphoning of information from a …
Researchers steal 20GB of corporate emails via doppelganger domains
Typosquatting is a well-known phenomena on the Internet. Most users have – at one point or another – misspelled the URL of the site they wanted to visit and were …
Human Compromise: The Art of Social Engineering
This book teaches you the “how-to” of social engineering. Taking a hands-on approach, you will learn everything from the field-tested methods for reading body …
Big corporations “hacked” in Defcon social engineering contest
Most of the recent high-profile cyber attacks against corporations and government organizations have one thing in common – they all started with a successful social …
Chameleon-like fake AV delivered via clever social engineering
A very complex and likely very efficient fake AV spreading campaign has been spotted targeting Facebook users. It starts with users being apparently contacted by one of their …
U.S. military contractors targeted with malicious PDFs
The last few months have seen a lot of cyber attacks aimed at U.S. military contractors and they are still ongoing. F-Secure researchers have recently spotted an email …
Google+ related scams move to Facebook
Scammers continue to take advantage of the great interest raised by the introduction of Google+ and have begun tricking Facebook users into giving them access to their …
Security threats: Unwrapping 2011
2011 has been a busy year so far for cyber criminals. No one can say IT security incidents went under reported, they have certainly been prominent in the headlines. HBGary …
First social engineering protection appliance
Highly targeted social engineering attacks have become the new vector of choice for adaptive persistent adversaries as an undetected entry point to enterprise networks, with …
Romanian president declared dead by e-mail scam
BitDefender discovered a spam wave using the Romanian president’s image to help spread malware. The unsolicited e-mail relies on a classic combination of social …
Cybercrime statistics show widespread phishing problem
The top five industries vulnerable to cybercrime include travel, education, financial services, government services and IT services, according to KnowBe4. Using the Inc.com …