Category Archives: Social Engineering

Or…How a security expert can fall for a phishing scheme Think no one will target your business with phishing attacks?  Think again… This confession is a bit hard for me. Just recently I was the target of a phishing attack.  … Continue reading

Posted in Botz Blog, Cloud Security, IBM i Security, Info Security Mgmt, Information Security, Mobile Security, Social Engineering | Tagged , , , , , , , , , , , , | Leave a comment

How many times have you heard someone say “Nobody would want to attack my computer.”?  I’ve heard it too many times to count. I even hear it from some of the businesses I work with. Well Brian Krebs, author of … Continue reading

Posted in Info Security Mgmt, Information Security, Social Engineering | Tagged , , , , , | Leave a comment

Here’s another interesting description of social engineering. This time from an “ethical hacking” team. Note that they don’t have to find security holes in technology! How to rob a bank: a social engineering walkthrough.

Posted in Social Engineering | Tagged , , | Leave a comment

Take a look at this fascinating article published on Yahoo! Finance by Stacy Cowley at CNNMoney.com that describes real social engineering attacks mounted at July’s DefCon conference in Las Vegas. This is an example of how attackers don’t have to … Continue reading

Posted in Social Engineering | Tagged , , | Leave a comment