social engineering
Researching online scams opens a window into the world of deceit, offering a glimpse into human vulnerabilities that...Read more
Cormac Herley’s paper Why do Nigerian Scammers Say They are from Nigeria? explains how some purposefully-lame scam...Read more
Slides for Presentation on Real-World Social Engineering AttacksI published the slides to my presentation “How...Read more
Phishing—a technique grounded in social engineering—remains an effective way for attackers to trick people into...Read more
Tactics that incorporate social engineering can be highly effective at bypassing security controls. Perhaps we are...Read more
Having covered the risks related to on-line social networking on several occasions, I'd like to outline my tips for using...Read more
The the most popular method for distributing malware for mobile devices has been grounded in social engineering. We...Read more
We all like knowing what other people are saying about us. That's why vanity searches—searching the web for the...Read more
I read about Formspring in the New York Times, which described the site as a “fast-growing social network that lets...Read more
On-line scammers use various venues to social-engineer their victims into compliance. Email has been the most popular...Read more