Your search for social engineering returned 92 results.

Sort results:

Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.

Blog Post Social engineering: How it's used to gain cyber information

Social engineering: How it's used to gain cyber information

With human error playing a role in many of today's big security incidents, miscreants are constantly looking to leverage end-user mistakes via social engineering.

Brief

Social engineering campaign leads to malicious Chrome extension

Security experts have discovered a social engineering ruse that installs a malicious Google Chrome extension to lure victims in a click fraud campaign.

News Iranian spies bait U.S. officials in years-long social engineering scheme

Iranian spies bait U.S. officials in years-long social engineering scheme

iSight Partners detailed the elaborate social engineering scheme used to target senior military and government officials in the U.S.

Opinion Social engineering will ramp up in 2015

Social engineering will ramp up in 2015

We still need more education in place, especially when it comes to building awareness of cyber hygiene among the general public.

News Clandestine Fox attack op uses social engineering to woo new victims

Clandestine Fox attack op uses social engineering to woo new victims

The operation previously targeted victims by exploiting bugs in popular software, FireEye said.

News Hackers used social engineering to glean military intel on Syrian opposition

Hackers used social engineering to glean military intel on Syrian opposition

Attackers sent malware through Skype chats promising pictures, FireEye reveals.

Video

Phishing for the "wildcard"

Kevin Bocek, vice president of security strategy and threat intelligence at Venafi, speaks with reporter Danielle Walker on social engineering ruses targeting wildcard certificates.

News Experts weigh in on Anthem breach, speculate on how attackers broke in

Experts weigh in on Anthem breach, speculate on how attackers broke in

Experts are speculating that attackers exploited a vulnerability in Anthem's IT system, or obtained credentials via social engineering.

Brief

Hackers steal $50k from Australian real estate agency

Cyber criminals have stolen $50,000 from an Australian real estate agency after one of its employees was duped through social engineering.

Slideshow Strangest news items in the security space

Strangest news items in the security space

Dick Cheney probably wasn't thinking about hackers when he had his heart defibrillator installed, but the possible threat was later addressed when the defibrillator's wireless function was disabled. This story, among others, made up some of the strangest in the security space.

News APT operation 'Double Tap' exploits serious Windows OLE bug

APT operation 'Double Tap' exploits serious Windows OLE bug

The group, APT3, is also believed to be behind Operation Clandestine Fox, which used social engineering to lure victims into installing malware.

News Tsukuba trojan aimed at Japanese banking customers

Tsukuba trojan aimed at Japanese banking customers

The Tsukuba trojan like other proxy changers is not technically advanced but uses an interesting social engineering technique, researchers at IBM Trusteer found.

News Threat of the month: Spear phishing

Threat of the month: Spear phishing

Social engineering will always be a looming threat for organizations, and spear phishing plays a significant part.

Blog Post

Penn State breached by two threat actors, earliest attack in 2012

Penn State University is notifying roughly 18,500 individuals and research partners that their personal information may have been compromised.

News FIN4 group infiltrates email, to game stock market, report says

FIN4 group infiltrates email, to game stock market, report says

FireEye researchers have uncovered a group, dubbed FIN4, that has targeted more than 100 companies to gain insider information.

News Phishing email contains Word doc, enabling macros leads to malware infection

Phishing email contains Word doc, enabling macros leads to malware infection

An employee with PhishMe was targeted by a crafty phishing email, allowing researchers to analyze an innovative attack that results in a malware infection.

Blog Post

Iowa State server breach exposes SSNs of nearly 30,000

The breach impacts Iowa State students where were enrolled at the university between 1995 and 2012.

Brief

CryptorBit demands $500 Bitcoin ransom

A ransomware variant of CryptoLocker and CryptoDefense corrupts the first 512 or 1024 bytes of any data file.

Brief

Details emerge about PlugX/Kaba RAT in Pacific Rim

FireEye researchers took a closer look at the malware and provided details in a blog post last week.

Brief

Free streams of 22 Jump Street, Transformers lead to adware, malware

Clicking on links to free streams of summer flicks such as 22 Jump Street and Transformers: Age of Extinction could lead to adware and malware.

Page 1 of 5

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US