The Future Of Cyber Threats Will Be Defined By Deception

The next 12 months will see major developments in the arms race between cyber attackers and security defenders as they continue to try to stay ahead of each other. Much of the cyber battle will revolve around the creation of new malware and defensive technology, but one of the defining factors of 2018 will be […]

10 Social Engineering Attacks Your End Users Need to Know About

It’s the middle of National Cybersecurity Awareness Month: the perfect time to look beyond the obvious stolen passwords, phishing and malware, and into some of the social engineering attacks less known to the average end user. Read/see the slideshow explaining the ten social engineering attacks every one should know about on Dark Reading.

Cyber Security – be aware of social engineering fraud

Social engineering fraud refers to the tricks used by criminals to deceive and manipulate their victims into giving out confidential information and funds. Read how the social engineering fraud still manages to trick users into giving out confidential information and funds on Hellenic Shipping News.

Know your adversary: Focus on social engineering

In this podcast recorded at Black Hat USA 2017, Tim Roberts, Senior Security Consultant at NTT Security, talks about social engineering and emphasizes the importance of security awareness and security culture. Listen to the podcast in which Tim Roberts, Senior Security Consultant at NTT Security explains why it is necessary for companies to understand social engineering […]

Low-tech threats make high-tech cybersecurity everyone’s business

It just might be a low-tech fake email, not a high-tech hacking scheme, that makes it hard for businesses and organizations to safeguard information in modern times. Firewalls and cutting-edge technology designed to keep networks safe and secure can be undone simply by asking employees to click a link. Read how low-tech threats make cyber […]

Verizon: Most Breaches Trace to Phishing, Social Engineering

Ninety percent of data breaches seen by Verizon’s data breach investigation team have a phishing or social engineering component to them. Not coincidentally, one of the hottest commodities on underground or dark web marketplaces are credentials, which attackers can use to log into enterprises and make it appear that they’re legitimate users. Read about the […]

Fully 84 Percent of Hackers Leverage Social Engineering in Cyber Attacks

A recent Nuix survey of 70 hackers at DEFCON 2016 found that 84 percent of respondents use social engineering as part of their attack strategy, and 50 percent change their attack methodologies with every target. When asked why they change attack methodologies, 56 percent said they do so to learn new techniques. Read about the latest […]

Cyber Security and Social Engineering: A Big Low Tech Problem

Read David Seide’s article about how low tech social engineering is one of the biggest cyber security problem facing businesses on JD Supra : Headline-grabbing cyber hacks of email accounts belonging to celebrities, corporations, government officials and political campaigns are becoming the norm.  Cybersecurity intended to guard against these acts brings to mind high tech […]

Other Voices: Social Engineering: The human element to hedge fund hack attacks

Read  Mark Coriaty explain how social engineering works on Opalesque : As financial firms become increasingly interconnected and globalized, their dependence on cyberspace has skyrocketed. While this amplified reliance on the infobahn has accelerated productivity and growth, it has also exposed firms to larger risks, such as hacking, malware, spyware and social engineering. Read his full […]

HR Tips for Preventing Data Breach by Social Engineering

If your organization or company has not yet been affected by a data breach associated with social engineering, it is only a matter of time. The cost of such a breach to a small company can bring financial ruin.  The average cost of a data breach, and exposure of personal information, can soar into the […]