Social Engineering — News

The Authentication Game

The balancing act between security and usability is hard to achieve. Inevitably, compromises are made either by system designers or wily users who find ways to circumvent complex rules and processes. But researchers from the University of Pretoria in South Africa have been conducting research and designed a new approach to authentication.

Anthony Caruana | 26 Jun | Read more

Hacked - The perfect attack

Think of the perfect attack like the perfect murder. It must be planned carefully and meticulously then executed systematically and flawlessly. Remember all the small detail in Hitchcock’s “The Rear Window”? No-one would have noticed anything or even missed the victim if it weren’t for Jimmy Stewart, who, with a broken leg had nothing better to do all day than to gaze out his rear window.

Dr Claudia Johnson | 26 Jun | Read more

Pwn2Own – Incentivised Hacking

HP's annual Pwn2Own contest has been run and won. Critical flaws in every major browser, which allowed remote code execution, were found as well as issues with Adobe's Flash and Reader products. Pwn2Own is a hacker contest that runs within the CanSecWest event in Vancouver. Hackers are offered cash prizes as incentives as well as donations of computer hardware and other prizes given to the security researchers.

Anthony Caruana | 15 Mar | Read more

Security threats explained: Social engineering

In this series, Computerworld Australia examines some of the information security threats facing small businesses and larger enterprises today. We’ve looked at [[artnid: 427471|internal negligence|new]] and continue the series by speaking to experts about the problem of social engineering.

Hamish Barwick | 20 Jun | Read more

SaaS, APTs and asymmetric risk take spotlight at Security Threats 2012

I had the opportunity to speak at a new security conference last week, Security Threats 2012. I presented on the topic of balancing business benefits with risks in the cloud (more on that later), but the event touched on a wide range of pertinent IT topics, provoking stimulating discussions of some of the most pressing challenges business leaders are facing.

Bernard Golden | 03 Feb | Read more

Social engineering: My career as a professional bank robber

Jim Stickley got his first computer at age 12, and he was chatting with other computer "nerds" on <a href="http://www.csoonline.com/article/688790/nokia-developer-forum-hacked-still-unavailable">bulletin board sites</a> by the time he was 16. A wannabe hacker, Stickley said his first foray into playing the system was with free codes -- codes that would exclude his phone and computer time from racking up charges that would incur the wrath of his parents.

Joan Goodchild | 27 Oct | Read more

Facebook Pwn tool takes profile info, helps social engineers

A group of security researchers based in Egypt have created a tool that will make <a href="http://www.csoonline.com/article/651490/social-engineering-attacks-highlights-from-2010">social engineering</a> easier because it automates the collection of hidden <a href="http://www.csoonline.com/article/print/%1Dhttp://www.csoonline.com/article/497076/5-facebook-twitter-scams-to-avoid">Facebook</a> profile data that is otherwise only accessible to friends in a user's network.

Joan Goodchild | 14 Sep | Read more

Hackers could reverse-engineer Microsoft patches to create DoS attacks

The <a href="http://www.networkworld.com/topics/security.html">security</a> company Qualys this week demonstrated how to reverse-engineer a <a href="http://www.networkworld.com/subnets/microsoft/">Microsoft</a> patch in order to launch a denial-of-service attack on <a href="http://www.networkworld.com/topics/windows.html">Windows</a> DNS <a href="http://www.networkworld.com/topics/server.html">Server</a>.

Jon Brodkin | 25 Aug | Read more

Social engineering: 3 mobile malware techniques

Social engineers have been using various <a href="http://www.csoonline.com/article/480589/9-dirty-tricks-social-engineers-favorite-pick-up-lines">dirty tricks</a> to fool people for centuries. <a href="http://www.csoonline.com/article/596512/social-engineering-techniques-4-ways-criminal-outsiders-get-inside">Social engineering</a>, the art of <a href="http://www.csoonline.com/article/494464/social-engineering-5-security-holes-at-the-office-includes-video-">gaining access to buildings</a>, systems or data by exploiting <a href="http://www.csoonline.com/article/663329/social-engineering-3-examples-of-human-hacking">human psychology</a>, rather than by breaking in or using technical hacking techniques, is as old as crime itself and has been used in many ways for decades.

Joan Goodchild | 26 Jul | Read more