Social Engineering

Social Engineering | News, how-tos, features, reviews, and videos


salted hash thumbnail final
video

Scammers spoof Office 365, DocuSign and others | Salted Hash Ep 21

As phishing attacks evolve, hackers are using customization and targeted scams to ensnare users. Asaf Cidon, vice president, email security services at Barracuda, talks with host Steve Ragan about the ever-changing cat-and-mouse game...

human weak link cybersecurity primary

5 information security threats that will dominate 2018

The global security threat outlook evolves with every coming year. To combat the threat in 2018, enterprises must understand these five global cyber threats.

Mingis_on_Tech
video

Mingis on Tech: How linguistics can help catch cyberattackers

When it comes to tracking down the bad actors behind malware and ransomware, cybersecurity firms are turning to linguists.

spear fishing

How to stop spear-phishing cold

By now, the shape of many major hacks is apparent. They start with a targeted attack on an individual email account, and, once inside, spread to the rest of the organization. Current standards vouch only for the sending email server,...

Load More
You Might Also Like