Social Engineering

Social Engineering | News, how-tos, features, reviews, and videos


salted hash thumbnail final
video

Scammers spoof Office 365, DocuSign and others | Salted Hash Ep 21

As phishing attacks evolve, hackers are using customization and targeted scams to ensnare users. Asaf Cidon, vice president, email security services at Barracuda, talks with host Steve Ragan about the ever-changing cat-and-mouse game...

human weak link cybersecurity primary

5 information security threats that will dominate 2018

The global security threat outlook evolves with every coming year. To combat the threat in 2018, enterprises must understand these five global cyber threats.

Mingis_on_Tech
video

Mingis on Tech: How linguistics can help catch cyberattackers

When it comes to tracking down the bad actors behind malware and ransomware, cybersecurity firms are turning to linguists.

spear fishing

How to stop spear-phishing cold

By now, the shape of many major hacks is apparent. They start with a targeted attack on an individual email account, and, once inside, spread to the rest of the organization. Current standards vouch only for the sending email server,...

medical records laptop doctor

Healthcare records for sale on Dark Web

A clinic in Baltimore is just one example of a healthcare provider having its records stolen, only to find them on the Dark Web for less than one cent per record.

twitter logo eyeball

How to deal with the bot crisis on Twitter

You may have run into these bots a few times. What looks like an actual human being could have been a bot sending you Twitter spam...or even worse. One of the most nefarious examples is when Twitter bots are used to inflate traffic to...

People walking with airplane in background

Email security appears grounded as attacks continue to take flight

With clever cybercriminals finding creative new ways to get to users, has email security lost the battle to protect.

1 picture that key

7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

7 ways criminal hackers use high-tech surveillance—sometimes with a social engineering element—to tap into the enterprise to get the keys to your kingdom, or sensitive information.

1 intro visitor

Social engineering fake outs

Learn how a consultant infiltrated his client’s buildings and networks.

Load More