Articles on Social Engineering
- Social Engineering Asymmetry of Data Value, Social Engineering, and What To Do Information perceived as valueless won't be protected—but its value to attackers differs from value to the organization. Knowing AV product names helps tune malware; knowing application versions...
- Social Networking Profile Spy Scams on Facebook Facebook scams promising "Find out who viewed your profile" trick victims into revealing personal details including phone numbers. The malicious site shows fake Facebook pages in the background to...
- Social Engineering Social Engineering Western Union Scam - The Role of a Money Mule Western Union scams entice victims to send money—at the end of the trail is a money mule. Criminals recruit individuals, often unknowingly, to receive and forward stolen funds, making the money trail...
- Social Engineering How to Integrate Social Engineering into an Information Security Assessment
- Malware Emerging Information Security Threats, 2007