Tag Archives: social engineering

Resetting the Passwords for CIA Director John Brennan and Homeland Security Secretary Jeh Johnson

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Resetting the Passwords for CIA Director John Brennan and Homeland Security Secretary Jeh Johnson

Telemarketer Payback with Social Engineering

Social engineering is a very useful skill to have. But please use your powers with the highest level of ethics. See image below.

Posted in Security Blog | Tagged , , , | Comments Off on Telemarketer Payback with Social Engineering

Scottrade Breach

“Cybercriminals had unauthorized access to our network for a period of several months between late 2013 and early 2014” According to a Cyber Security Alert page on Scottrade, Federal investigators found indicators that prove Scottrade’s network and systems was used. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Scottrade Breach

Don’t Be a Victim of Tech Support Scams

This year alone, an estimated 3.3 million people in the United States will pay more than $1.5 billion to scammers. Attorney General Bob Ferguson and experts from Microsoft explain how scammers pretending to help you with computer problems can steal … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Don’t Be a Victim of Tech Support Scams

Hijacked Satellite (Download Links) used to Steal Data From Thousands of Computers

The Turla APT group (we think), who are responsible for the Epic Turla cyber-espionage operation, pushing malware to hundreds of computers in more than 45 countries, have hijacked downstream links from satellites to hide their command and control servers. The … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Hijacked Satellite (Download Links) used to Steal Data From Thousands of Computers

Here’s Why Physical Security Walkthroughs Are a Great Test

If you act like you belong, it’s not often you get questioned about your actions. This has been proven time and time again at many places with a lot of turnaround. This has especially worked well for a recent Walmart … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Here’s Why Physical Security Walkthroughs Are a Great Test

Business Email Compromise Leads to $737,000 Transfer to China

The FBI classifies “phishing that leads to loss” as Business Email Compromise (BEC). In a recently released story that closely matches the BEC hack in Omaha I wrote about back in February, another company fell victim to a spearphishing attack … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Business Email Compromise Leads to $737,000 Transfer to China

Phishing and Vishing Attacks are Up

With the recent OPM hack… I use hack loosely because of this. A lot of Personally Identifiable Information (PII) was stolen. About 32 million records. The PII consisted of Names, Addresses, Social Security Numbers, Dates of Birth, places one lived … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Phishing and Vishing Attacks are Up

How Social Engineering Affected Tesla

In totally uncool moves, two Tesla owned accounts were hijacked via social engineering: A bad guy called AT&T customer support and pretended to be a Tesla employee. This person then demanded all phone calls to the company be forwarded to a … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on How Social Engineering Affected Tesla

Social Engineering Fraud Videos

Though this is an advertisement for consulting services (at the very end), this video has two great examples of how fraud is committed through social engineering. Here is a talk from a DerbyCon that Jamison gives a full presentation on … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Social Engineering Fraud Videos