Type your search and hit enter

Stories by Joan Goodchild

In Pictures: 20 notorious worms, viruses and botnets

The earliest worms and viruses were created for geeky fun and did little harm - oh, how times have changed. Here are 20 worms, viruses and botnets that show the evolution of malware, from Creeper to Flame.

Written by Joan Goodchild05 Nov. 12 08:57

10 hacks that made headlines

In our first Rogues Gallery, we looked at ten infamous social engineers -- con men who exploited human weaknesses rather than technical vulnerabilities.

Written by Joan Goodchild16 May 12 06:24

Three tips for using the Social Engineering Toolkit

Two years ago, Dave Kennedy, a penetration tester, social engineering expert and contributor to the website social-engineer.com, wanted to create a tool for pen testers to simulate social engineering attacks.

Written by Joan Goodchild27 April 12 04:05

Most Corporate Fraud Is an Inside Job

Rates of fraud dipped slightly this year, according to Kroll's report. But, increasingly, it is being committed by folks right under your nose.

Written by Joan Goodchild12 Nov. 11 15:20

5 more dirty tricks: Social engineers' latest pick-up lines

You may now be savvy enough to know that when a friend reaches out on Facebook and says they've been mugged in London and are in desperate need of cash, that it's a scam. But social engineers, the criminals that pull off these kinds of ploys by trying to trick you, are one step ahead.

Written by Joan Goodchild27 Sept. 11 04:45

Twitter scam claims to get you more followers

A scam that has been making its way around Twitter for some time has resurfaced recently and promises to increase a user's followers, but really gives control of one's account to a questionable third party.

Written by Joan Goodchild24 June 11 05:25

Tips to use Facebook legally to conduct background checks

As more people create Facebook profiles (500 million and growing), and sign on to the many social media sites available today, hiring managers are finding they have new opportunities to get background information on job candidates.

Written by Joan Goodchild16 June 11 09:46

Securing Google Apps: A CIO Q&A

Boston-based Bay Cove Human Services is a non-profit organization that offers assistance and service to 4,000 people and families in Massachusetts. CIO Hilary Croach has several technology challenges to contend with. For starters, the agency has its hands in a number of service areas, including helping individuals with developmental disabilities, mental illness, drug and alcohol addiction, and those who need support with aging. With about 140 locations around Eastern Massachusetts, Bay Cove's employees and IT operations are scattered.

Written by Joan Goodchild17 May 11 05:28

Osama Bin Laden news spurs wave of scams, malware

Malware creators are already using the news of Osama Bin Laden's death as a opportunity to try and dupe people into clicking on malicious links. According to cloud-security firm Zscaler, researchers were already seeing malicious sites emerge to capitalize on the news within hours of the announcement.

Written by Joan Goodchild03 May 11 03:54

Botnets: Size isn't everything, says new report

Published figures estimating the size and scope of botnets are often inaccurate and do not reflect the threat these compromised networks pose to security, according to research released this week by ENISA, the European Network and Information Security Agency.

Written by Joan Goodchild09 March 11 07:15