Cyber Security – be aware of social engineering fraud

Social engineering fraud refers to the tricks used by criminals to deceive and manipulate their victims into giving out confidential information and funds. Read how the social engineering fraud still manages to trick users into giving out confidential information and funds on Hellenic Shipping News.

Know your adversary: Focus on social engineering

In this podcast recorded at Black Hat USA 2017, Tim Roberts, Senior Security Consultant at NTT Security, talks about social engineering and emphasizes the importance of security awareness and security culture. Listen to the podcast in which Tim Roberts, Senior Security Consultant at NTT Security explains why it is necessary for companies to understand social engineering […]

Low-tech threats make high-tech cybersecurity everyone’s business

It just might be a low-tech fake email, not a high-tech hacking scheme, that makes it hard for businesses and organizations to safeguard information in modern times. Firewalls and cutting-edge technology designed to keep networks safe and secure can be undone simply by asking employees to click a link. Read how low-tech threats make cyber […]

Verizon: Most Breaches Trace to Phishing, Social Engineering

Ninety percent of data breaches seen by Verizon’s data breach investigation team have a phishing or social engineering component to them. Not coincidentally, one of the hottest commodities on underground or dark web marketplaces are credentials, which attackers can use to log into enterprises and make it appear that they’re legitimate users. Read about the […]

Fully 84 Percent of Hackers Leverage Social Engineering in Cyber Attacks

A recent Nuix survey of 70 hackers at DEFCON 2016 found that 84 percent of respondents use social engineering as part of their attack strategy, and 50 percent change their attack methodologies with every target. When asked why they change attack methodologies, 56 percent said they do so to learn new techniques. Read about the latest […]

Cyber Security and Social Engineering: A Big Low Tech Problem

Read David Seide’s article about how low tech social engineering is one of the biggest cyber security problem facing businesses on JD Supra : Headline-grabbing cyber hacks of email accounts belonging to celebrities, corporations, government officials and political campaigns are becoming the norm.  Cybersecurity intended to guard against these acts brings to mind high tech […]

Other Voices: Social Engineering: The human element to hedge fund hack attacks

Read  Mark Coriaty explain how social engineering works on Opalesque : As financial firms become increasingly interconnected and globalized, their dependence on cyberspace has skyrocketed. While this amplified reliance on the infobahn has accelerated productivity and growth, it has also exposed firms to larger risks, such as hacking, malware, spyware and social engineering. Read his full […]

HR Tips for Preventing Data Breach by Social Engineering

If your organization or company has not yet been affected by a data breach associated with social engineering, it is only a matter of time. The cost of such a breach to a small company can bring financial ruin.  The average cost of a data breach, and exposure of personal information, can soar into the […]

A hacker’s best friend is a nice employee

Read Elizabeth Weise’s article about social engineering and phishing on USA Today : When it comes to hacking, the most dangerous thing at most companies may not be their computer network but the lowly desk telephone. “You can get everything you need — information about their security, their operating system, what kind of computers they use. […]

Self-Service Password Reset & Social Engineering: A Match Made In Hell

Read Jackson Shaw recount his experience with social engineering hack on Dark Reading : Recently, I was on a call with the CISO of a customer whose CEO’s account had been hacked. The CISO and his team were trying to understand how this had occurred, and, following a short investigation, we discovered that the hacker […]