![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Social Engineering - The Real E-Terrorism?
One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. The technical support operator expressed an interest so the hacker sent him an e-mail with a photo of the car attached. When the operator opened the attachment it created a back door that opened a connection out of AOL's network, through the firewall, allowing the hacker full access to the entire internal network of AOL with very little effort on the hacker's part. The above is a true story and it is an excellent example of one of the biggest threats to an organisation's security - social engineering. It has been described as people hacking and it generally means persuading someone inside a company to volunteer information or assistance. Examples of techniques employed by hackers include:
Social engineering attacks can have devastating consequences for the businesses involved. Accounts can be lost, sensitive information can be compromised, competitive advantage can be wiped out and reputation can be destroyed. By implementing some simple techniques you can reduce the risk of your organisation becoming a victim or, in the event that you are targeted, keep the consequences to a minimum.
Conduct regular audits, not only on IT systems but also on policies, procedures and personnel so that any potential weaknesses can be addressed as soon as possible. About The Author Rhona Aylward has extensive experience in the area of Quality Management and more recently in Information Security Management. She is a qualified Lead Auditor for BS7799 and CEO for Alpha Squared Solutions Ltd. www.a2solutions.co.uk, raylward@a2solutions.co.uk
MORE RESOURCES: WATCH: Earthquake security cam footage WIVB.com - News 4 Analysis | How CISA plans to get tech firms to bake security into their products The Washington Post Band of Barbers, Judges and Security Guards Uses Soviet-Era Guns to Repel Russian Drones The Wall Street Journal Tallahassee Memorial Healthcare provides update on IT security issue WTXL ABC 27 Tallahassee News Have your say: the global state of cyber security | Cyber Security Hub Cyber Security Hub Why 2023 is the time to consider security automation The Enterprisers Project Skyhigh Security Launches New Global Partner Program Business Wire President Biden Announces Appointments to the President’s ... The White House Move surveillance to a proactive security strategy with video analytics Security Magazine Crypto's Decentralized Finance Security Problem BankInfoSecurity.com Butler County public, private schools get more money for security upgrades Hamilton Journal News Biden Administration Announces Additional Security Assistance for ... Department of Defense Catholic lawmaker calls for 'frank and sober' security conversation ... Catholic Review of Baltimore SaaS in the Real World: Who's Responsible to Secure this Data? The Hacker News Just How Early Can Departing Passengers Access Security? Simple Flying CBP proposes efforts to strengthen aviation security | U.S Customs and Border Protection ERDC-CERL organizes international conference held to fight ... erdc.usace.army.mil Application Security for Microservices: API Gateway, Service Mesh, and More Security Boulevard Deputy Secretary Sherman's Meeting with Poland's National ... US Embassy and Consulate in Poland Montana bill addresses security and foreign ownership of land KRTV NEWS Great Falls Cequence Security API Security Testing framework encourages ... SiliconANGLE News How Data Governance Policies Impact Cybersecurity Security Boulevard Datametrex Obtains Two Patents for Data Security Yahoo Finance Aqua Security's Jeannette Lee Heung Named a 2023 CRN GlobeNewswire Early Edition: February 6, 2023 Just Security The Government and Private Sectors Cooperate to Ensure Food Security; Through the supply chain, 60,000 tons of barley were delivered Marketscreener.com Tilapia Genome Provides Boost to Global Food Security Technology Networks Finland's Most-Wanted Hacker Nabbed in France – Krebs on Security Krebs on Security Memphis Police Chief Trained With Israel Security Forces The Intercept Statement of Homeland Security Secretary Mayorkas on the Family ... Homeland Security Galaxy Note 20 kicks off Samsung's February 2023 security update Android Headlines DHS Announces Process Enhancements for Supporting Labor ... Homeland Security U.S. military poised to secure new access to key Philippine bases The Washington Post House Republicans Preparing Broad Inquiry Into F.B.I. and Security Agencies The New York Times Musk's Twitter still violates FTC security pact, new whistleblower says The Washington Post Git patches two critical remote code execution security flaws BleepingComputer Identity Thieves Bypassed Experian Security to View Credit Reports ... Krebs on Security MSI breaks Secure Boot for hundreds of motherboards BleepingComputer Microsoft ends Windows 7 extended security updates on Tuesday BleepingComputer |
![]() |
![]() |
![]() |
RELATED ARTICLES
Adware and Spyware: The Problems and Their Solutions The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection. Phishing - Learn To Identify It Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. Protect Your Little Black Book The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Internet Shopping - How Safe Is It? Millions of people make purchases online, but many people are still wary. They fear the unknown and have many doubts and questions about who they are dealing with. 3 Things You Must Know About Spyware 1)Spyware is on your system. Like it or not, statistically speaking, you probably have spyware on your machine right now. Dialing Up a Scam: Avoiding the Auto-Dialer Virus For many, the daily walk to the mailbox evokes mixed feelings: The glee that your favorite monthly magazine - or a friend's hand-written letter (quite a surprise in the e-mail age) may be waiting is countered by anxiety of how many bills the postman left you.Now, imagine coming across your phone bill, thicker and heavier than normal. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. Is Spyware Watching You? Imagine my surprise when I received a phone call from afriend who told me he'd been the victim of a "spyware"attack that left him shaking at his loss of privacy.I listened to his horror story with a sympathetic ear, butI felt secure since I carry anti-virus software and afirewall (both by Norton). Ransom Trojan Uses Cryptography for Malicious Purpose Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. Message Board Security Problems Security leaks can be a big problem for any site using a message board. Hackers can actually use your message board to go in and change things on your site. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. Spyware, What It Is, What It Does, And How To Stop It Spyware is software that runs on a personal computer without the knowledge or consent of the owner of that computer. The Spyware then collects personal information about the user or users of the infected computer. File Sharing - What You Need to Know! File sharing on p2p is soaring despite the music and movie industryefforts to curb the practice. Regardless of which side of the arguement you are on it is likely that sharing of copyright materialwill continue in one form or another for the foreseeable future. Hacked: Who Else Is Using Your Computer? A friend called me one day and asked if I would stop by to look at his computer. He said it was running abnormally slow and he had found something on his hard-drive he could not explain. Eliminate Adware and Spyware Everyone should eliminate spyware and adware from your hard drive for your computer privacy protection. Spyware and adware programs also slow down the speed of your computer by cluttering your hard drive with annoying programs. Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing. Blogs as Safe Haven for Cybercriminals? To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. ![]() |
home | site map |
© 2006 |