social engineering
Hybrid social engineering attacks
Fraudulent phone calls are increasing in popularity. One possible use for these bogus “bank’ calls is to utilize personal identification information stolen using …
SpyEye Trojan hijacks mobile SMS security for online fraud
A stealth new attack carried out by the SpyEye Trojan circumvents mobile SMS security measures implemented by many banks. Using captured code, Trusteer discovered a two-step …
5 data-stealing apps offered on Android Market
Nearly a month ago, researchers have discovered a Chinese mobile phone monitoring service that allows users to compromise a target’s mobile phone running Symbian or …
Free tool to combat Facebook security issues
Zscaler released a free security tool that protects against malicious threats, scams and spam propagated on Facebook through a technique called “Likejacking.” …
48% of enterprises targeted by social engineering attacks
48% of enterprises have been victims of social engineering attacks, experiencing 25 or more such attacks in the past two years at a average cost of over £15,000 per …
Skype users targeted with calls spreading fake AV
Showing considerable resourcefulness in their attempt to trick Internet users, fake AV peddlers have begun targeting Skype users with an unexpected call. “Attention: …
Evolving cyber threats continue to drive security strategy
43 percent of global companies think they have an effective information security strategy in place and are proactively executing their plans, placing them in the category of …
When scammers socialize
A sophisticated, seemingly broadly orchestrated online scam that promises bogus prizes like iPads or gift cards in order to dupe Internet users into giving up their …
Facebook tool automates syphoning of user data
A group of security researchers has developed a proof-of-concept Java-based tool that could allow malicious individuals to automatize the syphoning of information from a …
Researchers steal 20GB of corporate emails via doppelganger domains
Typosquatting is a well-known phenomena on the Internet. Most users have – at one point or another – misspelled the URL of the site they wanted to visit and were …
Human Compromise: The Art of Social Engineering
This book teaches you the “how-to” of social engineering. Taking a hands-on approach, you will learn everything from the field-tested methods for reading body …
Big corporations “hacked” in Defcon social engineering contest
Most of the recent high-profile cyber attacks against corporations and government organizations have one thing in common – they all started with a successful social …
Featured news
Resources
Don't miss
- The risks of autonomous AI in machine-to-machine interactions
- Balancing cloud security with performance and availability
- The XCSSET info-stealing malware is back, targeting macOS users and devs
- A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)
- Two Estonians plead guilty in $577M cryptocurrency Ponzi scheme