Read more about social engineering
Bookmark and Share
  • Cyber crooks go after enterprise millions with Dyre malware, social engineering

    07.04.2015

    "An experienced and resource-backed cybercrime gang" is using the relatively new Dyre/Dyreza banking Trojan coupled with effective social engineering to steal millions from businesses, IBM Security Intelligence researchers John Kuhn and Lance Mueller warned.

  • How cybercriminals hack our brains

    20.02.2015

    Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually resulting in the loss of money or valuable data.

  • The psychology of Facebook scam victims

    03.11.2014

    A two-year study of over 850,000 Facebook scams by antivirus software provider Bitdefender has revealed that scammers have infected millions of users with the same repackaged tricks.

  • iCloud wasn't hacked, says Apple

    03.09.2014

    Apple has released a statement denying that iCloud was hacked to steal nude photos of celebrities.

  • Social Engineering Penetration Testing

    15.08.2014

    Authors: Gavin Watson, Andrew Mason, and Richard Ackroyd Pages: 390 Publisher: Syngress ISBN: 0124201245 Introduction We know that the human element is often the weakest link in the security chain, and that attackers - whether they are after money, user information, corporate or state secrets - regularly take advantage of this fact to gain a foothold into computer systems and networks.




Spotlight

Over 225,000 Apple accounts compromised via iOS malware

Researchers from Palo Alto Networks and WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in all, some 225,000 valid Apple accounts have been compromised.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, Sep 1st
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //