November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,647 hits
Tag Archives: social engineering
Resetting the Passwords for CIA Director John Brennan and Homeland Security Secretary Jeh Johnson
Posted in Security Blog
Tagged 2015, CIA, CIA Director John Brennan, email, email fraud, hacked, Homeland Security Secretary Jeh Johnson, Security Awareness, social engineering
Comments Off on Resetting the Passwords for CIA Director John Brennan and Homeland Security Secretary Jeh Johnson
Telemarketer Payback with Social Engineering
Social engineering is a very useful skill to have. But please use your powers with the highest level of ethics. See image below.
Posted in Security Blog
Tagged Information Technology Security Awareness, lol, social engineering, telemarketer
Comments Off on Telemarketer Payback with Social Engineering
Scottrade Breach
“Cybercriminals had unauthorized access to our network for a period of several months between late 2013 and early 2014” According to a Cyber Security Alert page on Scottrade, Federal investigators found indicators that prove Scottrade’s network and systems was used. … Continue reading
Posted in Security Blog
Tagged 2013, 2014, 2015, breach, cybercrime, hacked, information security, phishing, Scottrade, social engineering
Comments Off on Scottrade Breach
Don’t Be a Victim of Tech Support Scams
This year alone, an estimated 3.3 million people in the United States will pay more than $1.5 billion to scammers. Attorney General Bob Ferguson and experts from Microsoft explain how scammers pretending to help you with computer problems can steal … Continue reading
Posted in Security Blog
Tagged 2015, scam, scammers, scamming, Security Awareness, social engineering, vishing
Comments Off on Don’t Be a Victim of Tech Support Scams
Hijacked Satellite (Download Links) used to Steal Data From Thousands of Computers
The Turla APT group (we think), who are responsible for the Epic Turla cyber-espionage operation, pushing malware to hundreds of computers in more than 45 countries, have hijacked downstream links from satellites to hide their command and control servers. The … Continue reading
Posted in Security Blog
Tagged 2015, APT, command and control, phishing, satellite, social engineering, Turla, watering hole
Comments Off on Hijacked Satellite (Download Links) used to Steal Data From Thousands of Computers
Here’s Why Physical Security Walkthroughs Are a Great Test
If you act like you belong, it’s not often you get questioned about your actions. This has been proven time and time again at many places with a lot of turnaround. This has especially worked well for a recent Walmart … Continue reading
Posted in Security Blog
Tagged 2015, fraud, Physical Security, Security Awareness, social engineering
Comments Off on Here’s Why Physical Security Walkthroughs Are a Great Test
Business Email Compromise Leads to $737,000 Transfer to China
The FBI classifies “phishing that leads to loss” as Business Email Compromise (BEC). In a recently released story that closely matches the BEC hack in Omaha I wrote about back in February, another company fell victim to a spearphishing attack … Continue reading
Posted in Security Blog
Tagged 2015, cybercrime, FBI, fraud, phishing, Security Awareness, social engineering, vishing
Comments Off on Business Email Compromise Leads to $737,000 Transfer to China
Phishing and Vishing Attacks are Up
With the recent OPM hack… I use hack loosely because of this. A lot of Personally Identifiable Information (PII) was stolen. About 32 million records. The PII consisted of Names, Addresses, Social Security Numbers, Dates of Birth, places one lived … Continue reading
Posted in Security Blog
Tagged malware, OPM, phishing, Security Awareness, social engineering, vishing
Comments Off on Phishing and Vishing Attacks are Up
How Social Engineering Affected Tesla
In totally uncool moves, two Tesla owned accounts were hijacked via social engineering: A bad guy called AT&T customer support and pretended to be a Tesla employee. This person then demanded all phone calls to the company be forwarded to a … Continue reading
Posted in Security Blog
Tagged 2015, hacked, hackers, Security Awareness, social engineering, Tesla, Third Party Assessments
Comments Off on How Social Engineering Affected Tesla
Social Engineering Fraud Videos
Though this is an advertisement for consulting services (at the very end), this video has two great examples of how fraud is committed through social engineering. Here is a talk from a DerbyCon that Jamison gives a full presentation on … Continue reading
Posted in Security Blog
Tagged Chubb, Derbycon, Jamison Scheeres, Security Awareness, social engineering, video tutorial
Comments Off on Social Engineering Fraud Videos