Chris Hadnagy, the founder and chief human hacker for the firm behind the Social Engineering Capture the Flag contest at DEF CON, has announced that he is launching the first social engineering event geared towards professionals in the business, technology, security, and psychology industries. Hadnagy stated that the Human Hacking
A new ESET report shows that just 42% of organizations provide training on compliance issues as part of their cybersecurity strategy, even though such training is vital for ensuring that user data is securely collected, processed and stored. Moreover, 63% of companies still mostly rely on passwords for securing data.
Even though the concept of spam is about 40 years old and phishing campaigns have been around for over 30 years, email-based attacks remain a massive problem for corporations and individual users alike, a new Cisco report shows. One of the reasons that email attacks are still so common and
A massive SIM swapping campaign has hit numerous members of the US cryptocurrency community over the past week. The aim of a SIM swapping attack is for the threat actor to get the phone number of a victim assigned to a SIM card they control. The criminal can subsequently use
“For Russian misinformation mongers, 2017 was the year of Instagram. As Facebook and Twitter cracked down on foreign influence campaigns amid media scrutiny, the Kremlin’s Internet Research Agency (IRA) found unprecedented success in shifting its disinformation efforts to the photo-sharing app, according to a new report commissioned by the Senate
Social engineering is one of the most prolific and effective means of gaining access to secure systems and obtaining sensitive information, yet requires minimal technical knowledge. Attacks vary from bulk phishing emails with little sophistication through to highly targeted, multi-layered attacks which use a range of social engineering techniques. Social