Joe Ferrara stresses that organisations need to continuously assess, train, reinforce the security message, and check how much users have learnt regarding social engineering threats.
The biometrics firm argues that the issues with biometrics often cloud over the benefits gained from using them.
Sophos' Greg Iddon told an audience at IP Expo 2016 some of the ways to spot - and stop - social engineering
GUI friendly social-engineering toolset made available as open source software - great for penetration testing, not bad for criminals either.
Two independent cyber-security researchers took the stage at Black Hat to diagram how groups possibly controlled by the Iranian government are targeting dissidents.
Social media platforms are a social engineering resource for hackers. Andrew Tang, service director, security, MTI Technology outlines the problem and what is required to guard against it
Raj Samani, CTO EMEA of Intel Security, has warned of the risks of employees networking online. As social networking sites contain a wealth of information on an organisation, they can be a treasure trove for criminals wanting to carry out email-based attacks.
Dr Jessica Barker took to the stage at InfoSecurity Europe 2016 to explain why social engineering works and what we can do to reduce its effectiveness.
A recent Pindrop study found a spike in call centre fraud as cyber-security improves.
Proofpoint's new report shows that malicious androids apps were downloaded two billion times and explains how attackers are not targeting systems but the humans behind them.
Social media users are largely unaware of the value to attackers of personal information they are freely sharing with friends and strangers alike, warns Kaspersky Lab.
Whaling attacks eschew technical sophistication in favour of a good old fashioned confidence trick and according to cyber-security company, Mimecast, they're on the rise.
Employees falling prey to social engineering ploys or with an agenda pose the "biggest threat to company security," concluded a new report from Ari Kaplan and Nuix.
Amichai Shulman demonstrates the role that social engineering plays in the life of a cyber-attacker.
Researchers at the Microsoft Malware Protection Center have observed a hacking team that they call Strontium aiming zero-day attacks at servers in within members of NATO and some governments within Eastern Europe.
Cyber-espionage group 'Pawn Storm' has been exploiting an unusual Java zero-day vulnerability to carry out drive-by-download attacks on a NATO country and US defence company, according to Trend Micro.
European law enforcement has cracked down and arrested members of a cyber-fraud gang, which stands accused of using social engineering and malware to steal more than £4 million from several large organisations.
Cyber-criminals are increasingly using social engineering tactics to target middle managers in business, leaving sensitive data at risk, according to a new report from Proofpoint.
A prison escape with a fake release note, from a fake website, set up via mobile phone, demonstrates yet again that people are our biggest security vulnerability says Fotis Gagadis.