It all adds up: Pretexting in executive compromise

Executives hold the keys to the corporate kingdom. If attackers can gain the trust of executives using layered social engineering techniques, they may be able to access sensitive corporate information such as intellectual property, financial data or administrative control logins and passwords. While phishing remains the primary pathway to executive compromise, increasing C-suite awareness of […]

The post  It all adds up: Pretexting in executive compromise appeared first on Security Intelligence.

Continue reading  It all adds up: Pretexting in executive compromise

5 Social Engineering Attacks to Watch Out For

We all know about the type of attacker who leverages their technical expertise to infiltrate protected computer systems and compromise sensitive data. This breed of malicious actor makes news all the time, prompting us to counter their exploits by inve… Continue reading 5 Social Engineering Attacks to Watch Out For

Social-Engineer Newsletter Vol 09 – Issue 117

In This Issue: “Charity Scams are Real – How Low Will They Go to Exploit a Tragedy?” Find out how cyber criminals monetize tragedy and exploit human emotions.  
The post Social-Engineer Newsletter Vol 09 – Issue 117 appeared first on … Continue reading Social-Engineer Newsletter Vol 09 – Issue 117

Social-Engineer Newsletter Vol 09 – Issue 116

In This Issue: “A Beginner’s Insight Into Vishing.” How can someone become a successful visher? Social-Engineer recently hired two team members who have been accumulating tremendous success. We interviewed them and we are sharing their insights with yo… Continue reading Social-Engineer Newsletter Vol 09 – Issue 116

Ransomware, phishing and pretexting are on the rise: Verizon

Ransomware and social attacks have been the big stars in the past year when it comes to cybersecurity, according to the latest edition of Verizon’s popular yearly report. Drawing from datasets aggregated from 67 other organizations, including 53,308 security incidents and 2,216 data breaches, Verizon’s 2018 Data Breach Investigations Report shows that ransomware was the most common type of malware reported. Based on 1,379 malware incidents, 56 percent involved ransomware. Verizon notes that it first mentioned ransomware in its 2013 report and predicted that it would flourish because of how effective it is for cybercriminals. “Now we have seen this style of malware overtake all others to be the most prevalent variety of malicious code for this year’s dataset. Ransomware is an interesting phenomenon that, when viewed through the mind of an attacker, makes perfect sense,” the report says. Ransomware is seen as so effective, Verizon says, because it can be attempted with little risk to […]

The post Ransomware, phishing and pretexting are on the rise: Verizon appeared first on Cyberscoop.

Continue reading Ransomware, phishing and pretexting are on the rise: Verizon

Potentially Unwanted Leaks: Social Engineering, Small Missteps, and Big Mistakes

In our previous article, we laid the groundwork for what we believe to be a serious threat to ICS/SCADA devices: social engineering. We continue here with some definitions, some of which you may already know.  Phishing Phishing is a relatively broad term for any attempt to trick victims into sharing sensitive information, such as passwords, […]… Read More

The post Potentially Unwanted Leaks: Social Engineering, Small Missteps, and Big Mistakes appeared first on The State of Security.

The post Potentially Unwanted Leaks: Social Engineering, Small Missteps, and Big Mistakes appeared first on Security Boulevard.

Continue reading Potentially Unwanted Leaks: Social Engineering, Small Missteps, and Big Mistakes

Social Engineering is on The Rise: Protect Yourself Now

As Internet security has evolved it has gotten easier to lock your systems down. Many products come out of the box pre-configured to include decent security practices, and most of the popular online services have wised up about encryption and password storage. That’s not to say that things are perfect, but as the computer systems get tougher to crack, the bad guys will focus more on the unpatchable system in the mix — the human element.

History Repeats Itself

Ever since the days of the ancient Greeks, and probably before that, social engineering has been one option to get around …read more

Continue reading Social Engineering is on The Rise: Protect Yourself Now