Social Engineering

Social Engineering news, information, and how-to advice

IRS
2 two factor

marionette social engineering

6 of the most effective social engineering techniques

It takes a layered approach to technology and added protections and assurances for your people to fight social engineering

How You Will Get Hacked Next

Yahoo breach lessons IT can't ignore

The indictment against the attackers behind the Yahoo breach shows just how vulnerable corporate networks are when thieves get their hands on employees' personal information

cleaning sponges detergent wash rinse chores

How to scrub your private data from 'people finder' sites

The internet has your number—among many other deets. Prevent identity theft and doxxing by erasing yourself from aggregator sites like Spokeo and PeekYou

irs chart phishlabs

IRS-related phishing scams seen running rampant

Also, Google, Dropbox, Adobe and DocuSign are being targeted by phishers, PhishLabs report says

man hands reading newspaper

Fretting over fake news? It's only going to get worse

Soon, not even experts will be able to tell the difference between fraudulent and genuine content. Ultimately, it comes down to the reputation of whoever created it

kaboom election hacking

Hacking the 2016 election: A timeline

Russian interference in the 2016 U.S. election played out in a series of hacks taking place over several months. Here’s how the attacks unfolded.

smartphone apps transmit user man

Better security through obscurity? Think again

Hackers may not target obscure apps as often as popular software, but your systems still won't be much safer

valentine hero

How white hat hackers do bad things for good reasons

Some companies are lovestruck with social engineering to monitor their employees

windows server download update install

3 ways Windows Server 2016 is tackling security

Windows Server 2016 could be a generational shift in security on par with Bill Gates’ introduction of Trustworthy Computing in 2002

video

Social engineering tricks and why CEO fraud emails work

At the Black Hat conference in Las Vegas, CSO’s Steve Ragan talks with Stephanie Carruthers, owner of Snow Offensive Security, about why business email compromise (aka CEO fraud) works so well against companies. She also discusses...

download progress bar

Spotted! 9 signs of a malicious download

You've heard the advice: Don't download or run software you're unsure of. Here's a quick review of the warning signs to stop you from taking unnecessary risks

Briefcase full of money

Interview with a Craigslist scammer

Ever wondered what motivates people who swindle others on Craigslist? Read on for a fascinating look into the mind of a small-time criminal

click fraud currency banking

Companies pay out billions to fake-CEO email scams

In the U.S. alone, victims have lost $960 million to the schemes over the past three years, according to new data from the FBI

blindfolded

8 reasons why your security awareness program sucks

Most awareness programs are just very bad and, like with all security countermeasures, there will be an inevitable failing

breach title

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report had bad news on multiple fronts

hacker hacked threat

5 tips for defending against advanced persistent threats

APTs are increasing in occurrence and severity, as are the costs associated with protecting businesses adequately from. Is your organization prepared?

Man trying to sleep in the middle of the night

4 tech nightmares keeping IT leaders up at night

From data breaches to social engineering, there’s plenty to keep tech types tossing and turning

head sand oblivious denial

Denial Syndrome: Users don’t think they'll get hacked

People who spend a good portion of their personal and professional lives online say they care about security and privacy. But most of them don’t act like it

Load More