Keen to the importance of not simply clicking on any email I receive in my inbox, I recently received a message with a subject line I could not resist: “Kevin Mitnick Security Awareness Training.” For ...
How AI-assisted social engineering attacks might evolve, and how cybersecurity could, and perhaps should, adapt to meet the ...
Social-Engineer LLC is proud to celebrate its fifteenth year of success in the information security (InfoSec) industry. Founded in 2010 by CEO Christopher Hadnagy, the company specializes in applying ...
In recent years, and particularly with the rise in use of social media, cyber criminals have taken to using psychological as well as technical methods of attack. Human beings, after all, are ...
When was the last time you had to threaten to shoot an unauthorized executive who was demanding access to a secure area? Read on for a real-life story and an important lesson on effective security ...
Social engineering raises some serious questions about data protection and compliance of accounting firms. Therefore, accounting firms should have measures to protect their IT assets against this ...
Social engineering-based attacks are a popular form of security manipulation, with cybercriminals using this technique for 98% of attacks in 2022. Social engineering can take many forms, including ...
Albert Einstein once said, “Things should be as simple as possible, but no simpler.” This is particularly true when designing a security training and awareness program for your organization. The goal ...
Cyberattacks, perhaps more so than any other type of crime, follow trends. As security professionals find ways to protect against old techniques, cybercriminals find opportunities elsewhere to ...
In the two preceding columns, John Orlando discussed the ethical dimensions of social engineering in penetration testing. Today I want to look at how to use social engineering effectively for ...