Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
Naoki Hiroshima recently relinquished to an attacker a prized possession that he owned since 2007: a very rare Twitter username so coveted that not only have people tried to steal it, but one person offered $50,000 for it.
Experts shared how organizations can identify saboteurs by interpreting physical cues or nonverbal communication.
Kevin Bocek, vice president of security strategy and threat intelligence at Venafi, speaks with reporter Danielle Walker on social engineering ruses targeting wildcard certificates.
There's no denying that social engineering plays a big part in a majority of attack today, and Chris Hadnagy, chief human hacker at Social-Engineer, Inc., hopes it a big topic at the upcoming RSA Conference.
Attackers have concocted a type of social engineering scam that delivers malware by duping people into thinking that their anti-virus programs need to be updated.
NSS Labs compared IE, Firefox, Chrome and Safari's protection against phishing and socially engineered malware attacks.
GoDaddy admitted that an employee was social engineered into giving up information that resulted in Naoki Hiroshima being extorted for his rare Twitter username.
The Syrian Electronic Army has taken claim on Twitter for compromising a variety of social media websites belonging to CNN and using the accounts to post messages blasting the popular news network's reporting.
An advanced remote access trojan known as Xtreme RAT has been identified by Seculert Research Lab as the malware used in an attack on Israeli organizations that impacted 15 machines.
Twitter returned a coveted username - @N - to Naoki Hiroshima on Tuesday, roughly one month after an attacker stole it through extortion.
We must stop the insanity by focusing on the data and controlling privileged user access.
The breach impacts Iowa State students where were enrolled at the university between 1995 and 2012.
A hacktivist group, calling itself KDMS Team, took credit for compromising the Rapid7 and Metasploit websites on Friday.
December's threat of the month is domain hijacking, a popular attack technique that takes over major domains.
Two teams have accepted rewards for demonstrating exploits against cell phones in the Mobile Pwn2Own 2013 contest sponsored by HP.
The anonymous hacker, claims to have breached the online accounts of comedian Steve Martin, editor Tina Brown and author Candace Bushnell, among others.
An exploit has already been spotted in the wild for one of the "critical" bugs found affecting Flash.
A variant of the Zeus P2P/Gameover trojan has been identified that will allow an attacker to take over the account of anyone using China's biggest Bitcoin platform, BTC China.
On Saturday, roughly one week after compromising accounts belonging to Skype, the Syrian Electronic Army took claim for compromising the official blog of Microsoft, as well as one of its Twitter accounts.
According to the researcher who discovered the bug, Google swiftly addressed the security issue, which could leave users' passwords vulnerable to theft.