Is a 100% Success Claim Realistic?

Postcard100withShadow

Guaranteed to give you a full head of hair…. guaranteed to make you lose weight… guaranteed to change your sex life…. These guarantees are often used in the marketing world to gain curiosity and to make the consumer take a peek at the offer. Now come on, you don’t have to admit it … but guaranteed: most of us reading this have taken a second gander at one of these offers at least once.  I know I have  However, even if you’ve fallen for this tactic in the past, you likely now realize that these claims are bogus or, at […] Continue Reading >

Creating a Culture of Security to Defend Against Social Engineering Attacks

security-culture

The Fifth Annual Benchmark study on Privacy and Security of Healthcare Data by Ponemon Institute has recently revealed what others have long perceived: There has been a shift in the root cause of data breaches from accidental to intentional.  While 90% of healthcare organizations represented in the study had experienced a data breach, for the first time, criminal attacks are the number one cause of these breaches. Continue Reading >

Social-Engineer @ RSA 2015

RSA Conf-1

Remember the days when RSA was an intimate little show with a few thousand visitors?  Neither do we!  Next week marks the start of RSA 2015, and the largest information security conference in the US will descend on San Francisco. Somewhere in the midst of 25,000 or so expected attendees will be the Social-Engineer team, so we wanted to make sure you know what we’re up to throughout the conference! Continue Reading >

One Phish, Two Phish, Red Phish, Blue Phish

PhishingDarkWaters

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails is out today. What is a phishing attack?  Phishing is a social engineering technique and we define it as the practice of sending emails that appear to be from reputable sources with the goal of influencing or gaining personal information. Continue Reading >

Whaling: Why Go After Minnows When You Can Catch a Big Phish?

whalers- wanted

Phishing attacks can come in many different forms. By now the risks associated with phishing and targeted spear phishing attacks are well known and documented throughout the security industry. Perhaps what’s often overlooked are hidden threats related to phishing. Today, phishing goes far beyond Nigerian wire transfer scams rife with poor grammar.  Although we still see newer variations of the old 419 scam still being used, we also see an increase in highly evolved campaigns targeting corporate executives or government officials. Continue Reading >

Risk Assessment in Social Engineering

risk-board-game

What does a soldier charging into the fight have in common with a soldier that flees from combat? Both of these people have evaluated risk and made decisions based on their assessments. Our safety and well-being largely depends on how appropriately we gauge risks and react to them; this guides much of human behavior and bears relevance to the field of social engineering. Continue Reading >

The Rise of Multifaceted Social Engineering Attacks

multifacted_social_engineering

In an October 2004 report, Gartner indicated the greatest security risk facing large companies and individual Internet users of the next ten years will be the increasingly sophisticated use of social engineering to bypass IT security defenses (Gartner 152).  Fast forward ten years, and social engineering attacks not only serve as a costly threat, but they are evolving in ways that make even the most security conscious people susceptible.  In recent times social engineering attacks have become even more dangerous due to their complexity. We are seeing a rise in multifaceted social engineering attacks.  These attacks combine a number of […] Continue Reading >

Deflate-gate: Analyzing the nonverbals of Belichick and Brady

Super Bowl Football

Many researchers have stated that 50, 60, 70, 80. or even 90% of what we say is nonverbal.  What I learned from Dr. Ekman is that you can’t really attach a percentage since it will change due to what is being communicated and how.  Regardless, the percentage is very high and many times what we say is the opposite of what we are feeling. Recently there has been a scandal in the NFL dubbed “deflate-gate” where the Patriot QB, Tom Brady, is being accused of knowingly having the footballs deflated below regulation.  Both he and the coach held press conferences […] Continue Reading >

PHaaS – The Business Value of Phishing as a Service

PHaaS-Works

In 2013 37.3 million users experienced phishing attacks leading to direct loss and reputational damage. As 2015 opens, phishing attacks continue to plague organizations across the globe with great success, but why? Cyber criminals have figured out how to target the human element of organizations, and they are evolving techniques to use an organization’s own employees as the first point of entry. No company, no matter the size or prestige, is immune to these types of attacks. In 2014 Microsoft employees fell victim to several targeted phishing attacks in which attackers were able to compromise internal email access in addition […] Continue Reading >

The Growing Threat Social Engineering Poses to Organizations… Is Your Team Equipped?

InfoGraphicBlog

This past week, FireEye released its “Hacking the Street” report indicating a group of highly sophisticated attackers exploited Wall Street using social engineering instead of malware or other technical attack vectors. The group, known as FIN4, initiated their attack through information-gathering. They reportedly contacted  an array of publicly traded pharmaceutical, health care and biotechnology organizations to pick up Wall Street terminology.  The group then used the merger and acquisition lingo in extremely convincing phishing emails to con professionals working in financial services into believing in the legitimacy of the email.  The emails were  filled with Visual Basic Applications (VBA) macros […] Continue Reading >