Social Engineering: Eight Common Tactics
A refresher course on some of the most prevalent social engineering tricks used by phone, email and Web.
A refresher course on some of the most prevalent social engineering tricks used by phone, email and Web.
Malware and botnets and phishing, oh my! Symantec's latest report on the Internet threat landscape highlights trends in cybercrime.
An e-mail touting the win of Democratic candidate Barack Obama directs users to a doctored election results page.
A recent survey finds employees continue to ignore security policies. (Surprise, surprise.) Here's a reminder about what often is missing in organizations that tempts workers to walk the wrong side of security law.
New survey results from Sophos find the number of spam emails with dangerous attachments have soared. The report reveals the malicious messages rose eight-fold in just three months.
The inside of the Symantec Security Operations Center looks like a scene out of the movie "War Games," and in many ways, the connection is fitting. The SOC, as it is known by Symantec employees, is in the business of detecting and analyzing network threats. And as malicious activity online gets increasingly more sophisticated, the war against cybercrime is definitely on.
According to a report from Fox News, several servers at the World Bank Group, an organization that offers economic assistance to developing countries around the globe, were repeatedly compromised and breached over the course of the last year.
Shira Rubinoff was a practicing psychologist in 2004. When it came to technology, her experience was simply as a tech user, certainly not a tech guru. Then one day she was phished.