Posts Tagged 'social engineering'
In October of 2000, we were introduced to the film “Pay It Forward.” The central idea of the heartwarming movie is that one good deed should beget three others, and the world will be a better place for it. That same idea is constantly at play in the cybersecurity world, but instead of good deeds, […]
Futher to my last post about social engineering in the IoT; here are a couple of attack scenarios that we might easily see emerge. Attack scenario 1: Reflected targeting and compromise Things are often too limited in processing and memory to compromise and manipulate to large effect. What is more, they might not have information […]
Successful social engineering attacks through IoT systems could lead to a perception of being surrounded by hostile devices, and greatly retard development; making the consequences of social engineering attacks in the IoT very significant. Social engineering attacks will certainly evolve into the Internet of Things (IoT), if they have not already. These attacks have the […]
Intel Security has compiled a list of the top ways cybercriminals play with the minds of their targeted victims. And the chief way that the cybercriminals do this is via phishing scams—that are designed to take your money. The fact that two-thirds of all the emails out there on this planet are phishy tells me […]
Why are data breaches so commonplace? Whether the attacks are against the energy sector as reported July 2014[i] with over 1,000 energy companies in North America and Europe reported to have been compromised. To other attacks targeting other sectors (e.g. Operation Troy, Operation High Roller Nightdragon, etc.) it would appear that no sector is immune […]