Social Engineering - Infoworld http://www.infoworld.com/t/2119 en 6 lessons learned about the scariest security threats http://www.infoworld.com/d/security/6-lessons-learned-about-the-scariest-security-threats-236704?source=rss_social_engineering <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/lock_screen.jpg" alt="6 lessons learned about the scariest security threats" width="243" height="182" align="right" /><br /><em><p align="right">Credit: Naomi Anderson</p></em></div> Security IT Strategy Cyber Crime Data Security Hacking Malware Network Security Social Engineering Web Security Windows Security Wireless Security Security Mon, 24 Feb 2014 11:00:00 +0000 Jason Snyder 236704 at http://www.infoworld.com Edward Snowden has stripped us of all illusion about our digital world http://www.infoworld.com/d/consumerization-of-it/edward-snowden-has-stripped-us-of-all-illusion-about-our-digital-world-232749?source=rss_social_engineering <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/snowden_screen.jpg" alt="Edward Snowden has stripped us of all illusion about our digital world" width="243" height="182" align="right" /><br /><em><p align="right">Credit: Reuters/Jason Lee</p></em></div> Big Data Consumerization of IT Data Management Security The Industry Standard Edward Snowden Encryption Internet Privacy Social Engineering Fri, 20 Dec 2013 11:00:00 +0000 Galen Gruman 232749 at http://www.infoworld.com How to stay one step ahead of phishing attacks http://www.infoworld.com/d/security/how-stay-one-step-ahead-of-phishing-attacks-231906?source=rss_social_engineering <p>Protecting yourself against phishing attacks used to be relatively easy. Don't download unexpected attachments. Visit banking websites directly instead of clicking on links in an email. And look for bad grammar.</p> <div class="image_half_chunklet_left"><img src="http://www.networkworld.com/graphics/2013/120213-phishing.jpg" alt="phishing" /> <div class="credit_half_chunklet">Credit: wikimedia</div></div> <p>Those days are gone. Today, a phishing attack can come from any direction via any channel.</p> Security Phishing Social Engineering IDG Insider Wed, 04 Dec 2013 11:00:00 +0000 uphan 231906 at http://www.infoworld.com Crooks 'stole' Experian data the old-fashioned way: They bought it http://www.infoworld.com/t/cyber-crime/crooks-stole-experian-data-the-old-fashioned-way-they-bought-it-229168?source=rss_social_engineering <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/Security_web_1_hp.jpg" alt="Crooks 'stole' Experian data the old-fashioned way: They bought it" width="243" height="182" align="right" /></div><p>Looks like Experian got punked. Security The Industry Standard Cyber Crime Data Loss Prevention Social Engineering Mon, 21 Oct 2013 15:27:20 +0000 InfoWorld Tech Watch 229168 at http://www.infoworld.com Your Facebook friends may be evil bots http://www.infoworld.com/d/security/your-facebook-friends-may-be-evil-bots-215016?source=rss_social_engineering <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/evil_bot_facebook.jpg" alt="Your Facebook friends may be evil bots" width="243" height="182" align="right" /><br /><em><p align="right">Credit: Palto/iStockphoto</p></em></div> Applications Security Facebook Cyber Crime Social Networking Phishing Social Engineering Mon, 08 Apr 2013 10:00:00 +0000 Galen Gruman 215016 at http://www.infoworld.com Java scam: How Oracle and Ask profit from sneaky add-ons http://www.infoworld.com/d/the-industry-standard/java-scam-how-oracle-and-ask-profit-sneaky-add-ons-211421?source=rss_social_engineering <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/java_hp.jpg" alt="Java" width="243" height="182" align="right" /></div><p>Who doesn't love free stuff? I, for one, don't, and neither do millions of users burdened with unwanted software when they install a new update of Java, Adobe Reader, or Skype.</p> Applications Open Source Software Security The Industry Standard Oracle Java Programming Search Engines Social Engineering Thu, 24 Jan 2013 11:00:00 +0000 Bill Snyder 211421 at http://www.infoworld.com The 5 cyber attacks you're most likely to face http://www.infoworld.com/d/security/the-5-cyber-attacks-youre-most-likely-face-208361?source=rss_social_engineering <p>As a consultant, one the security biggest problems I see is one of perception: The threats companies think they face are often vastly different than the threats that pose the greatest risk. For example, they hire me to deploy state-of-the-art PKI or an enterprisewide intrusion detection system, when really what they need is better patching.</p> <p>The fact is most companies face the same threats -- and should be doing their utmost to counteract those risks. Here are the five most common successful cyber attacks.</p> Security Anti-spam Anti-virus Malware Patch Management Phishing Social Engineering Security Tue, 04 Dec 2012 11:00:00 +0000 Roger A. Grimes 208361 at http://www.infoworld.com The 3 biggest mistakes made by security pros http://www.infoworld.com/d/security/the-3-biggest-mistakes-made-security-pros-202053?source=rss_social_engineering <p>Last week, I discussed the <a href="http://www.infoworld.com/d/security/3-security-mistakes-your-management-making-now-201624">three biggest mistakes senior management makes</a> in computer security. This week, let's examine the three biggest mistakes computer security engineers commit -- and have to answer for when they deal with senior management. You'll notice a resemblance between last week's post and this installment. No coincidence there; the issues are similar, though they differ in the details.</p> <p>Let's take a look at the problems.</p> Data Center Security Log Analysis Data Security Malware Security Management Social Engineering Security Tue, 11 Sep 2012 10:00:00 +0000 Roger A. Grimes 202053 at http://www.infoworld.com IT's 9 biggest security threats http://www.infoworld.com/d/security/its-9-biggest-security-threats-200828?source=rss_social_engineering <div style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/IFW_Hacking.jpg" alt="IT's 9 biggest security threats" width="243" height="182" align="right" /></div><p>Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses.</p> Security Cyber Crime Hacking Malware Network Security Password Security Phishing Social Engineering Security Mon, 27 Aug 2012 10:00:00 +0000 Jason Snyder 200828 at http://www.infoworld.com 9 popular IT security practices that just don't work http://www.infoworld.com/d/security/9-popular-it-security-practices-just-dont-work-199548?source=rss_social_engineering <div style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/44FEsecurity-hp.jpg" alt="9 popular IT security practices that just don't work" width="243" height="182" align="right" /></div><p>When it comes to IT security, FUD (fear, uncertainty, and doubt) is more than just the tool of overhyping vendors hoping to sell their next big thing.</p> Security Access Control Anti-spam Anti-spyware Anti-virus Application Security Authentication Cyber Crime Data Security Endpoint Protection Malware Network Security Password Security Patch Management Phishing Security Management Security Standards Security Tools Social Engineering Security Mon, 13 Aug 2012 10:00:00 +0000 Jason Snyder 199548 at http://www.infoworld.com Amazon and Apple aid and abet digital drive-by http://www.infoworld.com/t/cringely/amazon-and-apple-aid-and-abet-digital-drive-199654?source=rss_social_engineering <p>Late last week, Wired reporter Matthew Honan's digital life was shaken like a squirrel in the mouth of pit bull. With the unwitting help of Apple and Amazon, a group of hackers gained access to Honan's online identity and proceeded to have their way with it.</p> <p>Honan wrote <a href="http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/" target="_blank">a long account of his ordeal for Wired</a>, which has since boomeranged around the InterWebs:</p> Mobile Technology Security Cringely Authentication Data Security Mobile Security Hacking Social Engineering Wed, 08 Aug 2012 18:45:06 +0000 Robert X. Cringely 199654 at http://www.infoworld.com Ex-hacker spills secrets of fighting social engineering http://www.infoworld.com/d/microsoft-windows/ex-hacker-spills-secrets-of-fighting-social-engineering-199040?source=rss_social_engineering <p>Keen to the importance of not simply clicking on any email I receive in my inbox, I recently received a message with a subject line I could not resist: "Kevin Mitnick Security Awareness Training." For those unfamiliar with Kevin Mitnick, he is a world-famous hacker and engineer, now turned author and security advocate. My curiosity was piqued.</p> Microsoft Windows Security Risk Management Password Security Phishing Social Engineering Security Wed, 01 Aug 2012 10:00:00 +0000 J. Peter Bruzzese 199040 at http://www.infoworld.com Malware IQ test: Round 2 http://www.infoworld.com/d/security/malware-iq-test-round-2-198237?source=rss_social_engineering <div class="field field-type-text field-field-quiz-overview"> <div class="field-label">Overview:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> <!--paging_filter--><p>You've aced the <a href="http://www.infoworld.com/d/security/are-you-cyber-sleuth-test-your-malware-iq-187066">first round of InfoWorld's malware IQ test</a>, but how up to date are you on the latest malware threatscape? Take InfoWorld's latest malware quiz to test your savvy. Know the defining trait of a computer virus? Know how most computers are exploited? Dig in and learn how much you <em>really</em> know about being exploited.</p> </div> </div> </div> <!--paging_filter--> Security Cyber Crime Malware Security Management Social Engineering Web Security Security Thu, 26 Jul 2012 10:00:00 +0000 Jason Snyder 198237 at http://www.infoworld.com The two most feared attacks and how to avoid them http://www.infoworld.com/d/security/the-two-most-feared-attacks-and-how-avoid-them-196351?source=rss_social_engineering <p>These days when I'm consulting with big businesses, governments, and other organizations, two main topics come up over and over: <a href="http://www.infoworld.com/d/security-central/intercepting-pass-the-hash-attacks-186">pass-the-hash attacks</a> and <a href="http://www.infoworld.com/t/security/verizon-security-report-hacktivism-insider-threats-down-189215">hacktivism</a>. One government client put it thusly: "Our department considers pass-the-hash attacks our No.</p> Security Application Security Cyber Crime Data Loss Prevention Data Security Hacking Security Management Social Engineering Vulnerability Assessment Security Tue, 26 Jun 2012 10:00:00 +0000 Roger A. Grimes 196351 at http://www.infoworld.com Are you a cyber sleuth? Test your malware IQ http://www.infoworld.com/d/security/are-you-cyber-sleuth-test-your-malware-iq-187066?source=rss_social_engineering <div class="field field-type-text field-field-quiz-overview"> <div class="field-items"> <div class="field-item odd"> Malware comes in many guises. For most people it's a constant source of irritation. But for security mavens, the malware world offers all sorts of fascinating nooks and crannies -- charlatans and characters, flashes of brilliance, groaning idiocies, and irony. Think you know malware? You may be surprised. Put on your sleuth specs and set your ever-so-slightly-gray hat at a jaunty angle and see if you're in tune with the multi-billion-dollar industry -- or just a victimized bystander waiting to get duped by the next rogue bits.&nbsp; </div> </div> </div> <!--paging_filter-->Malware IQ test Security Anti-spam Anti-virus Hacking Malware Security Tools Social Engineering Web Security Windows Security Security Mon, 27 Feb 2012 11:00:00 +0000 Jason Snyder 187066 at http://www.infoworld.com Download InfoWorld's Malware Deep Dive report http://www.infoworld.com/d/security/download-infoworlds-malware-deep-dive-report-186438?source=rss_social_engineering <p>If malware were biological, the world would be in the grip of the worst pandemic in history. In 2009, more than 25 million unique malware programs were identified, more than all the malware programs ever created in all previous years. No one need wonder what all that malware is trying to do: It's trying to steal money -- through data theft, bank transfers, stolen passwords, or swiped identities.</p> Security Anti-spam Anti-virus Endpoint Protection Malware Network Security Phishing Security Management Social Engineering IDG Insider Wed, 15 Feb 2012 11:00:00 +0000 uphan 186438 at http://www.infoworld.com 2011: The year Mac malware got interesting http://www.infoworld.com/t/malware/2011-the-year-mac-malware-got-interesting-184927?source=rss_social_engineering <div style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/Apple_Security_hp.jpg" alt="2011: The year Mac malware got interesting" width="243" height="182" align="right" /></div> <p>For years, security professionals have argued that Mac OS X is just as prone to digital attack as the latest Windows system. Yet, Mac users have felt safer because, let's face it, few attackers focus on Macs.</p> Security Mac OS X Anti-virus Malware Social Engineering Tue, 24 Jan 2012 21:37:38 +0000 InfoWorld Tech Watch 184927 at http://www.infoworld.com Young people to IT security: 'What, me worry?' http://www.infoworld.com/d/the-industry-standard/young-people-it-security-what-me-worry-181778?source=rss_social_engineering <p>Don't tell my daughter I was talking about her behind her back, OK? A couple of weeks ago, she spilled a drink on her MacBook Pro's keyboard. We've all done that. It happens. But as we discussed the damage, I assured her that, worst case, she could move her backed-up files to her new machine. Back up? Uh oh. Not only does she not back up, but the Wi-Fi network in her apartment is not secured and she uses the same <a href="http://www.infoworld.com/t/password-security/stop-using-these-25-passwords-today-179885">weak passwords over and over</a>.</p> Security The Industry Standard BYOD Mobile Security Security Management Social Engineering Consumerization of IT Thu, 15 Dec 2011 11:00:00 +0000 Bill Snyder 181778 at http://www.infoworld.com Clickjacking attacks possible despite framebusting protection http://www.infoworld.com/d/security/clickjacking-attacks-possible-despite-framebusting-protection-181480?source=rss_social_engineering <p>The so-called framebusting mechanism implemented in browsers to help websites prevent clickjacking attacks doesn't live up to expectations, according to Google security engineer and Web security researcher Michal Zalewski, who released <a href="http://lcamtuf.coredump.cx/clickit/" target="_blank">proof-of-concept code</a> to demonstrate it.</p> Security Hacking Social Engineering Mon, 12 Dec 2011 16:02:19 +0000 admin 181480 at http://www.infoworld.com Anonymous threatens, then cancels, attack on drug ring http://www.infoworld.com/t/security/anonymous-threatens-then-cancels-attack-drug-ring-177609?source=rss_social_engineering <div style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/IFW_Hacking3.jpg" alt="Anonymous threatens, then cancels, attack on drug ring" width="243" height="182" align="right" /></div><p>When the Anonymous movement has a bad day, supporters get arrested. When the Zeta drug cartel has a bad day, nearly three dozen of its members are killed and dumped on a Mexican highway.</p> Security Cyber Crime Hacking Internet Privacy Social Engineering Security Tue, 01 Nov 2011 14:50:42 +0000 InfoWorld Tech Watch 177609 at http://www.infoworld.com