- Social Engineering When Targeted Attacks Aren't Targeted: The Magic of Cold Reading
Mass-scale attacks feel targeted due to cold reading—like fortune tellers making generalized statements that seem specific. A fake UPS delivery notice works because many people actually sent...
- Social Networking Information Security and Social Media Marketing Campaigns
Social media marketing creates security challenges: marketers need social network access (greater risk exposure), fast-changing campaigns may spawn uncontrolled satellite web servers, brand...
- Social Engineering Social Engineering and Mirroring the Emotional State
Effective social engineers are "high self-monitors"—they subconsciously pick up social cues and adjust their presentation, identifying topics of interest, appearing non-threatening through nonverbal...
- Social Engineering Asymmetry of Data Value, Social Engineering, and What To Do
Information perceived as valueless won't be protected—but its value to attackers differs from value to the organization. Knowing AV product names helps tune malware; knowing application versions...
- Social Networking Profile Spy Scams on Facebook
Facebook scams promising "Find out who viewed your profile" trick victims into revealing personal details including phone numbers. The malicious site shows fake Facebook pages in the background to...
- Social Engineering Social Engineering Western Union Scam - The Role of a Money Mule
Western Union scams entice victims to send money—at the end of the trail is a money mule. Criminals recruit individuals, often unknowingly, to receive and forward stolen funds, making the money trail...