GoDaddy Once Again Accused of Failing to Help Owner of Hijacked Website

GoDaddy Once Again Accused of Failing to Help Owner of Hijacked Website

The owner of RamshackleGlam.com shares her hacking story

NameChanger Fake AV Has over 200 Names, Uses Social Engineering Kit to Spread

NameChanger Fake AV Has over 200 Names, Uses Social Engineering Kit to Spread

A security researcher has been monitoring the cybercriminal operation

@JB Twitter Username Targeted by Hacker

@JB Twitter Username Targeted by Hacker

The attacker attempted to hijack the owner’s iCloud and Amazon accounts

Rapid7.com Hijacking: Theft of Employee Credentials, Not Faxed DNS Change Request

Rapid7.com Hijacking: Theft of Employee Credentials, Not Faxed DNS Change Request

Register.com continues to investigate the incident

Cybercriminals Use Aggressive Social Engineering Tactics Against French Organizations

Cybercriminals Use Aggressive Social Engineering Tactics Against French Organizations

Symantec continues to monitor the campaign dubbed "Operation Francophoned"

Cybercriminals Target Bank Accounts of European Organizations with Shadesrat Trojan

Cybercriminals Target Bank Accounts of European Organizations with Shadesrat Trojan

Here's how the attackers convince their victims to install the malware

Expert Says Skype Accounts Can Be Easily Hacked via Skype Support (Updated)

Expert Says Skype Accounts Can Be Easily Hacked via Skype Support (Updated)

Skype representatives say they're looking into the matter

Exxon Mobil Improves Cyber Security by Focusing on Employee Habits

Exxon Mobil Improves Cyber Security by Focusing on Employee Habits

CEO Rex Tillerson explains why people play an important role in security

BitInstant Hacked Through Social Engineering, $12,000 (€9,200) Stolen

BitInstant Hacked Through Social Engineering, $12,000 (€9,200) Stolen

The company's says the incident is partly the fault of their registrar

Sogeti Invites Hackers to Test Their Social Engineering Skills at HITB 2013 Amsterdam

Sogeti Invites Hackers to Test Their Social Engineering Skills at HITB 2013 Amsterdam

Individuals and firms are invited to sign up to the Sogeti Social Engineering Challenge

John McAfee Introduces Girls Who Helped Him Gather Intel on Belize Government

John McAfee Introduces Girls Who Helped Him Gather Intel on Belize Government

The antivirus pioneer talks about the women that worked as his operatives

John McAfee Used Social Engineering to Escape from Belize

John McAfee Used Social Engineering to Escape from Belize

The antivirus pioneer explains how he managed to flee from authorities

2013 Predictions: Better Exploit Mitigations Make Hackers Turn to Social Engineering

2013 Predictions: Better Exploit Mitigations Make Hackers Turn to Social Engineering

What's in stall for us next year based on the findings of Sophos researchers

Queen Elizabeth II and Prince Charles Prank Call Highlights the Perils of Social Engineering

Queen Elizabeth II and Prince Charles Prank Call Highlights the Perils of Social Engineering

Here's some expert advice on how to protect yourself and your company against this threat

Beware of Shady “Product Development Summits” Invitations

Beware of Shady “Product Development Summits” Invitations

GFI expert details the spam emails and explains why they should be avoided

Scam: World Trade Register Business Registration Is “Free”, but It Costs a Lot

Scam: World Trade Register Business Registration Is “Free”, but It Costs a Lot

Misleading offers and newly registered domains indicate the presence of a scheme

UGNazi Claims to Have Gained Access to Google’s Mark Monitor Account (Updated)

UGNazi Claims to Have Gained Access to Google’s Mark Monitor Account (Updated)

They apparently used social engineering to convince an employee to reset the account

 
Want more? Browse: