Sophos' Greg Iddon told an audience at IP Expo 2016 some of the ways to spot - and stop - social engineering
Research from Blue Coat Systems shows how despite the increased use of social media, workers are still failing to fully protect themselves from complex social engineering techniques
GUI friendly social-engineering toolset made available as open source software - great for penetration testing, not bad for criminals either.
Two independent cyber-security researchers took the stage at Black Hat to diagram how groups possibly controlled by the Iranian government are targeting dissidents.
Social media platforms are a social engineering resource for hackers. Andrew Tang, service director, security, MTI Technology outlines the problem and what is required to guard against it
Raj Samani, CTO EMEA of Intel Security, has warned of the risks of employees networking online. As social networking sites contain a wealth of information on an organisation, they can be a treasure trove for criminals wanting to carry out email-based attacks.
Dr Jessica Barker took to the stage at InfoSecurity Europe 2016 to explain why social engineering works and what we can do to reduce its effectiveness.
A recent Pindrop study found a spike in call centre fraud as cyber-security improves.
Proofpoint's new report shows that malicious androids apps were downloaded two billion times and explains how attackers are not targeting systems but the humans behind them.
Social media users are largely unaware of the value to attackers of personal information they are freely sharing with friends and strangers alike, warns Kaspersky Lab.
Whaling attacks eschew technical sophistication in favour of a good old fashioned confidence trick and according to cyber-security company, Mimecast, they're on the rise.
Employees falling prey to social engineering ploys or with an agenda pose the "biggest threat to company security," concluded a new report from Ari Kaplan and Nuix.
Amichai Shulman demonstrates the role that social engineering plays in the life of a cyber-attacker.
Researchers at the Microsoft Malware Protection Center have observed a hacking team that they call Strontium aiming zero-day attacks at servers in within members of NATO and some governments within Eastern Europe.
Cyber-espionage group 'Pawn Storm' has been exploiting an unusual Java zero-day vulnerability to carry out drive-by-download attacks on a NATO country and US defence company, according to Trend Micro.
European law enforcement has cracked down and arrested members of a cyber-fraud gang, which stands accused of using social engineering and malware to steal more than £4 million from several large organisations.
Cyber-criminals are increasingly using social engineering tactics to target middle managers in business, leaving sensitive data at risk, according to a new report from Proofpoint.
A prison escape with a fake release note, from a fake website, set up via mobile phone, demonstrates yet again that people are our biggest security vulnerability says Fotis Gagadis.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry