Articles on Social Engineering
- Networking A Close Look at PayPal Overpayment Scams That Target Craigslist Sellers PayPal overpayment scams target Craigslist sellers using fake payment notifications that ask victims to wire funds to a third-party "pickup agent." Scammers craft stories about working in rural areas...
- Tools Generating Domain Variations Used in Phishing The lookalike domains attackers will use against your brand are mostly predictable from a small set of mutation rules like bit flips, vowel swaps, IDN homographs, and missing dots. Free tools can...
- Social Engineering Website Backup Company's Misleading "Invoices" Suggest a Scam WebsiteBackup Company sent unsolicited letters resembling invoices to businesses, confusing recipients into thinking they owed payment for services they never ordered. The letters lacked the legally...
- Malware Conversation With a Tech Support Scammer Tech support scammers use scareware web pages to convince visitors their PCs are infected, then employ consultative sales tactics when victims call for help. Representatives use legitimate remote...
- Social Engineering The Manipulative Nature and Mechanics of Visitor Survey Scams Visitor survey scams use multiple choice questions to provide an excuse for offering "rewards," then employ scarcity tactics and fake testimonials to persuade victims to provide credit card details...
- Social Networking Scammers Prescreen Victims for Tech Support Scams via Twitter and Phone Tech support scammers use Twitter bots to respond to public messages containing words like "virus" and "malware," inviting potential victims to call phone numbers where automated systems profile...