Social Engineering

Social Engineering news, analysis, how-to, opinion and video. | CIO

medical records laptop doctor
twitter logo eyeball

People walking with airplane in background

Email security appears grounded as attacks continue to take flight

With clever cybercriminals finding creative new ways to get to users, has email security lost the battle to protect.

1 picture that key

7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

7 ways criminal hackers use high-tech surveillance—sometimes with a social engineering element—to tap into the enterprise to get the keys to your kingdom, or sensitive information.

1 intro visitor

Social engineering fake outs

Learn how a consultant infiltrated his client’s buildings and networks.

marionette social engineering

6 of the most effective social engineering techniques

It takes a layered approach to technology and added protections and assurances for your people to fight social engineering.

scam victim

Honeypot catches social engineering scams on social media

Research company investigates 40,000 fake accounts to find impersonator tactics. 

woman phone scam

Why awareness needs to teach scam detection and reaction

Most awareness programs teach users how to behave. Ira Winkler argues training needs to go further so people know what to do if they do fall victim to fraud.

fraud infog primary

Has fraud met its match?

New and dynamic authentication factors can help prevent identity theft. The idea of using a fingerprint reader to log on to a smartphone is nothing new, but the latest wrinkle is the pressure with which that finger pushes on the...

cleaning sponges detergent wash rinse chores

How to scrub your private data from 'people finder' sites

The internet has your number—among many other deets. Prevent identity theft and doxxing by erasing yourself from aggregator sites like Spokeo and PeekYou

The Internal Revenue Service's IRS tax filing form 1040.

'Tis the season to watch out for W-2 phishing scams

Earlier this month, the IRS sent out an urgent alert warning employers that this W-2 phishing scam had spread beyond the corporate world to other sectors, including school districts, tribal organizations and nonprofits

Man looking worn out in mod orange chair with a wad of cash in a mouse trap

Users take the cheese to solve data breaches

Verizon releases its annual breach report that puts the reader in the driver's seat.

crowd walking

The flaw in applying culture to awareness programs

I appreciate that organizations are beginning to realize that they need to understand their corporate culture in their implementation of awareness programs. It is long overdue. Unfortunately as a concept, it is being grossly...

kaboom election hacking

Hacking the 2016 election: A timeline

Russian interference in the 2016 U.S. election played out in a series of hacks taking place over several months. Here’s how the attacks unfolded.

valentine hero

How White Hat hackers do bad things for good reasons

Some companies are love struck with social engineering. White hat hackers are used to poke holes in your network and physical building.

01 boring

7 tips for better security awareness training sessions

At their worst, security awareness training sessions are boring wastes of time, both for employees and the IT people responsible for them. At their best, however, they are interactive, discussion-driven, and genuinely helpful...

fake lies pinocchio

What fake news means for IT—and how IT security can help fight it

The debate over fake news is roiling the political world, but elements of it look very familiar to tech veterans—and represent a potentially new attack vector that IT needs to worry about.

Graphic image of people running in rainbow lens

Hackers get around AI with flooding, poisoning and social engineering

Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases -- but even as the defensive technologies are getting better, attackers are finding ways to get around them

windows server download update install

3 ways Windows Server 2016 is tackling security

Windows Server 2016 could be a generational shift in security on par with Bill Gates’ introduction of Trustworthy Computing in 2002.

red blue tools

Best tools for red and blue teams are methodology, experience

Since the tools vary based on environment, it's the skills and know-how that red/blue teams need most

Load More