Your search for social engineering returned 51 results.

Sort results:

Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.

News Attacker extorts coveted Twitter username in elaborate social engineering scheme

Attacker extorts coveted Twitter username in elaborate social engineering scheme

Naoki Hiroshima recently relinquished to an attacker a prized possession that he owned since 2007: a very rare Twitter username so coveted that not only have people tried to steal it, but one person offered $50,000 for it.


"Hacking the human" talk dissects art of social engineering

Experts shared how organizations can identify saboteurs by interpreting physical cues or nonverbal communication.


Phishing for the "wildcard"

Kevin Bocek, vice president of security strategy and threat intelligence at Venafi, speaks with reporter Danielle Walker on social engineering ruses targeting wildcard certificates.

Blog Post Chris Hadnagy, chief human hacker, Social-Engineer, Inc.

Chris Hadnagy, chief human hacker, Social-Engineer, Inc.

There's no denying that social engineering plays a big part in a majority of attack today, and Chris Hadnagy, chief human hacker at Social-Engineer, Inc., hopes it a big topic at the upcoming RSA Conference.

News Email offering updates to real anti-virus actually delivers malware

Email offering updates to real anti-virus actually delivers malware

Attackers have concocted a type of social engineering scam that delivers malware by duping people into thinking that their anti-virus programs need to be updated.

News Study: Among top browsers, IE catches most socially engineered attacks

Study: Among top browsers, IE catches most socially engineered attacks

NSS Labs compared IE, Firefox, Chrome and Safari's protection against phishing and socially engineered malware attacks.


GoDaddy admits giving up info that led to Twitter username extortion

GoDaddy admitted that an employee was social engineered into giving up information that resulted in Naoki Hiroshima being extorted for his rare Twitter username.


CNN's social media accounts compromised by Syrian Electronic Army

The Syrian Electronic Army has taken claim on Twitter for compromising a variety of social media websites belonging to CNN and using the accounts to post messages blasting the popular news network's reporting.


Malware identified in attack against Israeli organizations

An advanced remote access trojan known as Xtreme RAT has been identified by Seculert Research Lab as the malware used in an attack on Israeli organizations that impacted 15 machines.


Twitter contacts extorted user, restores coveted '@N' handle

Twitter returned a coveted username - @N - to Naoki Hiroshima on Tuesday, roughly one month after an attacker stole it through extortion.

Opinion Combatting insider threats

Combatting insider threats

We must stop the insanity by focusing on the data and controlling privileged user access.

Blog Post

Iowa State server breach exposes SSNs of nearly 30,000

The breach impacts Iowa State students where were enrolled at the university between 1995 and 2012.


KDMS Team defaces more websites using DNS attacks

A hacktivist group, calling itself KDMS Team, took credit for compromising the Rapid7 and Metasploit websites on Friday.

Opinion Threat of the month: Domain hijacking

Threat of the month: Domain hijacking

December's threat of the month is domain hijacking, a popular attack technique that takes over major domains.


New mobile exploits demonstrated at Pwn2Own event

Two teams have accepted rewards for demonstrating exploits against cell phones in the Mobile Pwn2Own 2013 contest sponsored by HP.


"Guccifer" returns with new list of compromised high-profile accounts

The anonymous hacker, claims to have breached the online accounts of comedian Steve Martin, editor Tina Brown and author Candace Bushnell, among others.


Adobe issues patches for Flash, Shockwave player

An exploit has already been spotted in the wild for one of the "critical" bugs found affecting Flash.


Zeus variant targets users of China's biggest Bitcoin exchange

A variant of the Zeus P2P/Gameover trojan has been identified that will allow an attacker to take over the account of anyone using China's biggest Bitcoin platform, BTC China.


Syrian Electronic Army compromises more Microsoft accounts

On Saturday, roughly one week after compromising accounts belonging to Skype, the Syrian Electronic Army took claim for compromising the official blog of Microsoft, as well as one of its Twitter accounts.


Google fixes flaw in Gmail password reset process

According to the researcher who discovered the bug, Google swiftly addressed the security issue, which could leave users' passwords vulnerable to theft.

Page 1 of 3

Sign up to our newsletters