Social Engineering

Social Engineering

Insider Threats – Recognize and Respond to the Risk Within

Insider Threats – Recognize and Respond to the Risk Within

/
Ninety percent of organizations feel vulnerable to insider threats. That alarming statistic was recently published in the annual Insider Threat Report released by Crowd Research Partners. The survey respondents are almost equally ...

Online security tips for Valentine’s Day: how to beat the cheats

/
Love is in the air, and so are the hopes of scammers wanting to make a quick buck at your expense. Shore up your digital defenses this Valentine's Day with a look ...
impostor_syndrome.png

XKCD, Impostor Syndrome

/
Permalink ...
Panic attack: Apple scams apply pressure

Panic attack: Apple scams apply pressure

/
We take a look at some of the many vaguely threatening/panic-inducing attempts by Apple scams to phish potential victims. Featuring emails, texts, and...Edward Snowden?! Categories: Cybercrime Social engineering Tags: AppleApple ScamsApple Supportipoditunesphishphishingscam ...
Miro Video Player

Ep. 102 – Penning the Future with JJ Green

/
I don’t think any of you will be shocked when i say this world is increasingly more insecure. From our online persona to our physical security – everything is in danger. This ...
Social-Engineer Newsletter Vol 08 – Issue 101

Social-Engineer Newsletter Vol 08 – Issue 101

/
Vol 08 Issue 101 February 2018 In This Issue Social Engineering Your Life: Vishing, Phishing and Impersonation Advice for Daily Use Social-Engineer News Upcoming classes As a member of the newsletter you ...
Malwarebytes Researcher calls our most tenacious imposter

Boomerang spam bombs Malwarebytes forum—not a smart move

/
Boomerang Tech solutions had trouble configuring their spambots, thus dropping a few spam bombs on Malwarebytes forums. Watch us catch them red-handed in a scammer call. Categories: Cybercrime Social engineering Tags: BoomerangforumsMBAMspamTSS ...

Five Things You’re Doing That are Compromising Your Online Safety

/
Just like we work to improve our physical health and well-being, it’s also vitally important to improve our cyber health and keep ourselves safe from online danger. Here are five easy fixes ...
Stolen security logos used to falsely endorse PUPs

Stolen security logos used to falsely endorse PUPs

/
To gain the trust of users, the makers of PUPs put the logos of reputable security and tech firms on their websites to imply their product is endorsed by the companies. They ...
“Who visits your Twitter profile” spam app brings week of chaos

“Who visits your Twitter profile” spam app brings week of chaos

/
Last week saw a Twitter spam app claiming to show who "viewed your profile" and spreading throughout the social media platform. See how it spread, and what you can do to avoid ...
Loading...