Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's time to start a new work week. A shower, some coffee, and you're in the car and off. On the way to work you're thinking of all you need to accomplished this week. Then, on top of that there's the recent merger between your company and a competitor. One of your associates told you, you better be on your toes because rumors of layoffs are floating around.

You arrive at the office and stop by the restroom to make sure you look your best. You straighten your tie, and turn to head to your cube when you notice, sitting on the back of the sink, is a CD-ROM. Someone must have left this behind by accident. You pick it up and notice there is a label on it. The label reads "2005 Financials & Layoff's". You get a sinking feeling in your stomach and hurry to your desk. It looks like your associate has good reasons for concern, and you're about to find out for your self.

And The "Social Engineering" Game Is In Play:

People Are The Easiest Target
--------------------------------------------
You make it to your desk and insert the CD-ROM. You find several files on the CD, including a spreadsheet which you quickly open. The spreadsheet contains a list of employee names, start dates, salaries, and a note field that says "Release" or "Retain". You quickly search for your name but cannot find it. In fact, many of the names don't seem familiar. Why would they, this is pretty large company, you don't know everyone. Since your name is not on the list you feel a bit of relief. It's time to turn this over to your boss. Your boss thanks you and you head back to your desk. You have just become a victim of social engineering.

When Did I Become a Victim of Social Engineering?
--------------------------------------------
Ok, let's take a step back in time. The CD you found in the restroom, it was not left there by accident. It was strategically placed there by me, or one of my employees. You see, my firm has been hired to perform a Network Security Assessment on your company. In reality, we've been contracted to hack into your company from the Internet and have been authorized to utilize social engineering techniques.

The spreadsheet you opened was not the only thing executing on your computer. The moment you open that file you caused a script to execute which installed a few files on your computer. Those files were designed to call home and make a connection to one of our servers on the Internet. Once the connection was made the software on our servers responded by pushing (or downloading) several software tools to your computer. Tools designed to give us complete control of your computer. Now we have a platform, inside your company's network, where we can continue to hack the network. And, we can do it from inside without even being there.

This is what we call a 180 degree attack. Meaning, we did not have to defeat the security measures of your company's firewall from the Internet. You took care of that for us. Many organizations give their employees unfettered access (or impose limited control) to the Internet. Given this fact, we devised a method for attacking the network from within with the explicit purpose of gaining control of a computer on the private network. All we had to do is get someone inside to do it for us - Social Engineering! What would you have done if you found a CD with this type of information on it?

What Does It Mean to Be "Human"
--------------------------------------------
As human beings we are pretty bad at evaluating risk. Self preservation, whether it be from physical danger or any other event that could cause harm, like the loss of a job or income, is a pretty strong human trait. The odd thing is, we tend to worry about things that are not likely to happen. Many people think nothing of climbing a 12 foot ladder to replace an old ceiling fan (sometimes doing so with the electricity still on), but fear getting on a plane. You have a better chance severely inuring yourself climbing a ladder than you do taking a plane ride.

This knowledge gives the social engineer the tools needed to entice another person to take a certain course of action. Because of human weaknesses, inability to properly assess certain risk, and need to believe most people are good, we are an easy target.

In fact, chances are you have been a victim of social engineering many times during the course of your life. For instance, it is my opinion that peer pressure is a form of social engineering. Some of the best sales people I've known are very effective social engineers. Direct marketing can be considered a form of social engineering. How many times have you purchased something only to find out you really did not need it? Why did you purchase it? Because you were lead to believe you must.

Conclusion
--------------------------------------------
Defining The Term "Social Engineering": In the world of computers and technology, social engineering is a technique used to obtain or attempt to obtain secure information by tricking an individual into revealing the information. Social engineering is normally quite successful because most targets (or victims) want to trust people and provide as much help as possible. Victims of social engineering typically have no idea they have been conned out of useful information or have been tricked into performing a particular task.

The main thing to remember is to rely on common sense. If some one calls you asking for your login and password information and states they are from the technical department, do not give them the information. Even if the number on your phone display seems to be from within your company. I can't tell you how many times we have successfully used that technique. A good way of reducing your risk of becoming a victim of social engineering is to ask questions. Most hackers don't have time for this and will not consider someone who asks questions an easy target.

About The Author
----------------
Darren Miller is an Industry leading computer and internet security consultant. At the website - http://www.defendingthenet.com you will find information about computer security specifically design to assist home, home office, and small business computer users. Sign up for defending the nets newsletter and become empowered to stay safe on the Internet. You can reach Darren at [email protected] or at [email protected]

In The News:

India Needs a Cyber Security Strategy: Cyber Patriots Task Force  DATAQUESTFirst meeting of the Cyber Patriots Task Force was organized, which was chaired by Dr Gulshan Rai, National Cyber Security Coordinator.
Arlo's 4K wireless security camera is rolling out worldwide  EngadgetArlo's 4K wireless security camera will finally be available worldwide and will also be easier to find in the US starting this week. The company originally rele...
Customers turn to MSSPs as channel rules security roost  ChannelWorld.inManaged services is expected to dominate security spending in 2019, representing the largest technology category as customers turn to the channel for ...
Srinagar: Security forces arrest three JeM terrorists in Lawaypora  India TodayThe spokesperson added that the police also seized ammunition, including live rounds from the three terrorists.
tribeOS is Bermuda's First Ever Approved Digital Security  The TokenistLast week, tribeOS announced at the Security Token Summit in Bermuda that its digital security offering FIRE is the first digital security to be granted regulatory ...
Security Is Not Enough  besacenter.orgThe State of Israel is at a fateful crossroads. The unending necessity to safeguard the state's secure existence ensures that its leaders will face complex and ...
Galaxy S10 March security update improves Wireless PowerShare  SamMobileSamsung has finally released the Galaxy S10 March security update. The device is also getting a few improvements in addition to enhanced security.
LS polls: Security agencies 'on tenterhooks'  Greater KashmirGreaterKashmir: With the dates for the LokSabha elections in Jammu and Kashmir drawing closer, security agencies have started mapping out areas in Kashmir ...
Taliban Kill Dozens of Security Forces in Major Strike in Afghanistan  The New York TimesKANDAHAR, Afghanistan — The Afghan military has suffered its worst loss of the year in southern Afghanistan, with at least 40 security force members killed in a ...
Employee cybersecurity essentials part 1: Passwords and phishing  Help Net SecurityYour company may have state-of-the-art monitoring and the latest anti-malware and anti-virus programs, but that doesn't mean you're not at risk for a.
Realme U1 Update Brings March Security Patch, Nightscape Mode Coming With Android Pie Update  Gadgets 360Realme U1 was launched late last year, and is a popular smartphone from the Chinese company that was once a sub-brand of Oppo. The smartphone is priced ...
Brussels faces US clash over plan to monitor Huawei 5G security  Financial TimesEuropean Commission favours risk management rather than ban on Chinese company.
Kremlin mum on former Ukrainian security officer’s statements  TASSEarlier in the day former employee of the Ukrainian Security *Service* Vasily Prozorov made a number of statements at a news conference in Moscow.
#PollVault: Using Anti-Corruption, National Security to Fight for Voters' Attention  The WireEvery morning till the elections, The Wire's reporters and editors bring you Poll Vault – a summary of the most important political developments, all in one place.
Asia-Pacific Smart Home Security & Safety Systems Market 2014-2025: 2019 Growth Opportunity and Business Strategy Report  GlobeNewswireDublin, March 25, 2019 (GLOBE NEWSWIRE) -- The "APAC Smart Home Security & Safety Systems Market by Component, Product, *Service*, Application, and ...
The private security guard is symptomatic of what ails India  Times of IndiaChowkidars are creating quite a flutter on social media these days. Many have pointed out that Narendra Modi has found his 'chaiwalla' moment of 2019. Others ...
Thousands of security flaws found on UK government websites  New Scientist NewsInvestigation uncovers thousands of security vulnerabilities on UK government websites, including the National Archives and the Scottish prosecution *service*.
IAF inducts first Chinook helicopters, BS Dhanoa says big boost for national security  India TodayThe Indian Air Force (IAF) on Monday formally inducted the first unit of four heavy-lift Chinook helicopters in Chandigarh. Air Chief Marshal BS Dhanoa ...
Kushner Used WhatsApp, a Very Bad Database Leak, and More Security News This Week  WIREDJared and Ivanka used private messaging against the rules, and more security news this week.
France: Security in Paris tightened amid fears of further rioting  Al Jazeera EnglishAbout 6000 police officers and two aerial drones deployed in the capital to help monitor the demonstrations.
Researchers find 36 new security flaws in LTE protocol  ZDNetSouth Korean researchers apply fuzzing techniques to LTE protocol and find 51 vulnerabilities, of which 36 were new.
NAPCO Security Technologies Announces School Security Project  PRNewswireAMITYVILLE, N.Y., March 25, 2019 /PRNewswire/ -- NAPCO Security Technologies, Inc. (NasdaqGS: NSSC), one of the world's leading solutions providers and ...
Overstock’s tZERO Security Token Platform to Launch Cryptocurrency Trading App This Summer  CryptoGlobeOverstock's security token trading platform tZERO is reportedly set to launch a cryptocurrency trading app this summer, to let users buy and sell bitcoin on their ...
Security beefed up in Dhaka's diplomatic zone  Dhaka TribuneDhaka Metropolitan Police (DMP) has ratcheted up security in and around the capital's diplomatic enclave to avoid any untoward incident, ahead of ...
Prize backs UQ physicist's data security quest - UQ News  UQ NewsDr Jacq Romero ... her work seeks to secure communication, conserve data privacy and guard against the growing risk of cyberattacks. 25 March 2019.
The killing of a 12-year-old boy in Kashmir has prompted local voices to decry militant tactics  Scroll.inAtif Mir was taken hostage by Lashkar-e-Taiba members and killed when the forces blew up the house in which they were hiding.
Congress has insulted martyrdom of soldiers, put question mark on national security: Amit Shah  Economic TimesBJP chief Amit Shah Saturday asked Congress president Rahul Gandhi to clear his party's stand on Sam Pitroda's comments questioning the government's ...
Security fears for England's European Qualifier in Montenegro  SkySportsThere are security concerns for England's European Qualifier in Montenegro with travelling fans buying tickets for the home end, Sky Sports News has learned.
The Early Edition: March 25, 2019  Just SecurityCurated summary of up-to-the-minute national security developments at home and abroad.
Daily Crunch: Facebook admits password security lapse  TechCrunchThe Daily Crunch is TechCrunch's roundup of our biggest and most important stories. If you'd like to get this delivered to your inbox every day at around 9am ...
Homeland Security warns of critical flaws in Medtronic defibrillators  TechCrunchHomeland Security has issued a warning for a set of critical-rated vulnerabilities in Medtronic defibrillators that put the devices at risk of manipulation.
Are security concerns over Huawei a boon for its European rivals?  The EconomistIN THE DAYS of pre-internet capitalism the troubles of one dominant company in an industry tended to be good news for its rivals. In today's hyperconnected ...
Security Lessons from My Game Closet  Dark ReadingIn an era of popular video games like Fortnite and Minecraft, there is a lot to be learned about risk, luck, and strategy from some old-fashioned board ...
Woman's Home Security Camera Captures 'Ghost Cat' Suddenly Vanishing  LADbibleThe clip was filmed on 12 January in Austin, Texas, and shows the cat walking up the path until it gets into the light - which is when it suddenly disappears from ...
Mozilla releases security updates Firefox 66.0.1 and 60.6.1 ESR  Ghacks Technology NewsMozilla has just released Firefox 66.0.1 and Firefox 60.6.1 ESR to the public. The two new versions of Firefox patch critical security vulnerabilities in the web ...
School security system to give police access to camera feeds  Education WeekDAYTON, Ohio (AP) — An Ohio K-12 school scheduled to open in the fall will include a security system that would allow police to tap into school cameras.
Is XRP a security or not? Answering the dilemma that is gripping crypto space  AMBCrypto NewsAccording to a BitMEX research piece, Ripple released 100 billion XRP in January 2013, out of which 80 billion was gifted to a company....
Russian control of US uranium supply is a huge national security problem  Fox NewsOn domestic uranium mining, used for nuclear power generation and national defense purposes, the United States is being dominated.
Those abusing PM now insulting security forces: Mukhtar Abbas Naqvi  Economic TimesDelhi: Those who have been indulging in an abuse competition against Prime Minister Narendra Modi are now "insulting" the bravery of the security forces, ...
SFO security lines shut down after passenger gets through checkpoint with ammunition  The Mercury NewsThree security checkpoints at San Francisco International Airport were shut down Saturday morning after a passenger made it through screening with ...
Trump says auto imports don't threaten national security, despite tariff threat  CNNWashington (CNN) President Donald Trump said Friday he doesn't see car imports as a national security threat, even though he has considered using national ...
Abu Dhabi approves $1.5 billion for water scarcity and food security R&D: Tweet  ReutersAbu Dhabi's crown prince approved on Monday 5.6 billion dirhams ($1.52 billion) for research and development surrounding water scarcity and food security ...
Dh5.6 billion approved to address water scarcity, food security problems, says Abu Dhabi crown prince  gulfnews.comDubai: A multi-billion-dirham budget has just been approved in the UAE to help address some of the most critical problems of the world: lack of water and food ...
Google Play Touts Certs in Quest For Enterprise Security  ThreatpostGoogle has snagged three security and privacy certifications for Google Play as it tries to appeal to enterprises despite numerous malicious apps and security ...
Major Aadhaar data leak plugged: French security researcher  The HinduThe Indian cyber security machinery, in collaboration with a self-proclaimed anonymous French security researcher who has been vocal about data security ...
Worried that Facebook Employees Know Your Password? Here are Some Pro Security Tips  News18Facebook allowed hundreds of millions of user passwords to be accessible to by its employees for years and Facebook violated fundamental computer-security ...
Vulnerability Assessment Vendors: How to Find the Right One  Security TodayLearn about the key factors to pay attention to when selecting a provider of network vulnerability assessment services.
Triton and the new wave of IIoT security threats  Network WorldTriton malware, which can shut down industrial safety systems, causing damage to facilities and threatening human life, targets the industrial internet of things.
Facial recognition can speed you through airport security, but there's a cost  CNETA growing Customs and Border Protection program pits convenience and security against privacy.
Watch: PM Modi's audio interaction with security guards across the country  Economic TimesPrime Minister Narendra Modi Wednesday hit back at Rahul Gandhi for his 'chowkidar chor hai' barb at him, saying the Congress president has insulted people ...
Air Force poised to release final solicitation notice for national security space launch  SpaceNewsBlue Origin has argued that the Air Force should delay the selection of launch providers and give companies more time to develop their vehicles. WASHINGTON ...
Russian hackers targeting European governments before elections, security firm warns  CNN(CNN) Russian state-linked hackers are increasing their efforts targeting governments in Europe, a top cybersecurity firm has warned ahead of the European ...
Security forces corner LeT men in Bandipora  The HinduAccording to the police, two militants, including a 'commander,' were trapped during a search operation.
Special security measures in place for hearing of Nawaz's plea in Supreme Court  DAWN.comA press statement released by the top court on Monday announced security measures that have been taken ahead of the hearing — that will be held tomorrow ...
OPINION | Rafale Expose: No security secret revealed  Deccan HeraldThe MoD itself publicises techno-military developments. Does that mean it has compromised national security?
Update now! WordPress hackers target Easy WP SMTP plugin  Naked SecurityTwo hacking groups have been spotted targeting websites running unpatched versions of the WordPress plugin Easy WP SMTP.
TitanHQ Adds Sandboxing and DMARC Authentication to SpamTitan Email Security  MarTech SeriesSpamTitan email security customers, both new and existing, got a pleasant surprise earlier this week when leading cloud security vendor TitanHQ added both ...
Midwest floods foreshadow national security threat posed by climate change  PBS NewsHourThe Missouri River floodwater surging on to the air base housing the U.S. military's Strategic Command overwhelmed round-the-clock sandbagging by airmen ...
Chinese involvement in Israeli infrastructure may threaten security, U.S. study warns  HaaretzA new American study recommends that the U.S. government help Israel set up an oversight mechanism for Chinese investments and technology in the country.
Microsoft warns Windows 7 users of looming end to security updates  TechCrunchMicrosoft has rolled out a patch that will warn Windows 7 users that security updates will soon come to an end. The patch rolled out Wednesday warning users of ...
5 essential router security settings you need to check now  Fox NewsThe bad news: most people don't give a second thought to their routers. This lack of know-how puts a lot of households in a dangerous position. The United ...
Security becomes a ‘smart’ business opportunity  The HinduInnovative Ideals & Services has evolved from being the purveyor of simple video door phones to that of wearable safety devices with advanced features.
Exclusive: Bangladesh top security adviser accused of abductions  Aljazeera.comPrime Minister Sheikh Hasina's security adviser accused of using state security to abduct three men in business dispute.
Congress is right to probe Trump White House security clearances. Hand over the documents.  USA TODAYAmid credible allegations that Trump put national security at risk, Congress is trying to protect America while the White House stonewalls.
Six new cars rated 'poor' for security in theft-risk survey  BBC NewsSix new car models have been given a "poor" ranking in a theft-risk report on keyless entry vehicles. Thatcham Research assessed the vulnerability of cars to ...
UN Security Council sanctions regime  Economic TimesThe Security Council can take action to maintain or restore international peace and security under Chapter VII of the UN Charter. Sanctions measures under ...
MPs' security beefed up as threats intensify  The Northern EchoTHE region's MPs are having to improve home security and some have police presence at their surgeries following an increase in numbers of threats,…
The Head of Verizon Media's Red Team Has One Simple Security Tip  PCMagOn this episode of Fast Forward, I welcome Josh Schwartz, head of Verizon Media's internal Red Team. That means he spends his days trying to hack into his ...
Extra security creates chaos at Christchurch Airport  Stuff.co.nzFrantic scenes of passenger congestion at Christchurch Airport may be a taste of things to to come if airport security regulations are extended to regional flights ...
7 Steps for Improving Cloud Security With Business Integration  InfoQ.comLike any major shift in the IT industry, the cloud brings new security risks. Here are some common risks associated with integrating cloud-based business ...
Is Huawei a security threat? Seven experts weigh in  The VergeThe United States government is cracking down hard on Huawei. Lawmakers and intelligence officials have claimed the telecommunications giant could be ...
Polymath, SeriesOne Team Up to Simplify Security Token Issuance  CoinDeskSecurity token platform Polymath has partnered with digital securities fundraising platform seriesOne to offer an “end-to-end” solution for security token issuance.
Burkina Faso: Atrocities by Armed Islamists, Security Forces  Human Rights WatchAtrocities by Islamist armed groups in Burkina Faso's northern Sahel Region and by security forces during counterterrorism operations have left scores dead and ...
How To Begin A Career In Cyber-Security  ForbesWhat are some good tips for people who want to begin a career in cybersecurity? originally appeared on Quora: the place to gain and share knowledge, ...
Nebraska flood shows how extreme weather can threaten national security  The VergeCatastrophic flooding in Nebraska has wiped out roads, overtopped dams, and left at least a third of the Offutt Air Force Base submerged, highlighting the ...
Nehru, China, and the Security Council seat  The HinduToday's policymakers fail to understand Nehru's eminently sensible approach.
Indiana District Plans $2.1 million in Security Upgrades  Campus Security & Life Safety MagazineClark-Pleasant Schools will spend more than $2 million on security improvements and upgrades for its eight campuses, following the approval of a work bid by ...
America’s Corruption Is a National Security Threat  Foreign PolicyIf they've been paying attention, Americans have received some rude wake-up calls in recent years. What unpleasant news do these messages convey?
Security cam catches shooting near Chesterfield golf club  WTVR CBS 6 Newsideo offers new clues as police investigating a shooting near a Chesterfield golf club that sent a man to the hospital Saturday night.
Blockstream Revamps ‘Green’ Wallet, Adding Security Features and Sidechain Support  CoinDeskBlockchain technology startup Blockstream has unveiled a revamped version of its bitcoin wallet, now called Blockstream Green. Perhaps the biggest overhaul ...
Homeland Security Chief Cites Top Threat to U.S. (It’s Not the Border)  The New York TimesWASHINGTON — Kirstjen Nielsen, the homeland security secretary, said on Monday that cyberthreats against the United States were a national security crisis ...
Science Minister announces funding for cyber security and screen entertainment projects in Bristol  GOV.UKChris Skidmore announces that projects in the South West focusing on cyber security, screen entertainment and environmental science will receive up to ...
After attack on Gurugram family, security upped  Times of IndiaBhoop Singh Nagar in Bhondsi saw heavy police deployment on Saturday, two days after a group of men barged into a house and attacked the family membe.
13yo M'sian Slapped Twice by MPH Bookstore Security Guard After Being Falsely Accused of Stealing  WORLD OF BUZZBuying books should be an enjoyable experience for a kid but for this teen, he may have been scared off bookstores for a long time after this traumatising ...
Blockchain in Biometrics Could be Used in Travel Security, US Customs Rep Says  CointelegraphNews. Using blockchain for biometric tracking would be the technology's killer app in the travel security sector, according to a representative from the United ...
Jammu & Kashmir: Militants hold citizens hostage as security forces close in  India TodayThe hostages include a 10-year-old boy. Security forces are engaged in the rescue effort.
Jacinda Ardern announces Royal Commission into security agencies after Christchurch attack  NewshubPrime Minister Jacinda Ardern has announced there will be a Royal Commission of Inquiry into New Zealand's security and intelligence agencies after the ...
Chowkidar effect: BJP mops up bulk of private security donations  Business StandardWith the Bharatiya Janata Party (BJP) mobilising itself on social media and on the ground by invoking the chowkidar (watchman) tag, the move has both political ...
Libya stands at a 'critical juncture', UN mission head tells Security Council  UN NewsPredicting that the “days ahead will prove foundational to the years ahead for Libyans and the region”, the top United Nations official in the country told the ...
Drone Sighted at Thiruvananthapuram Airport, VSSC, Beach; Security on High Alert  News18'We have monitored the radars installed at various areas and found that the drone might have been operated by some locals,' a top police official said.
BitGo Adds Custody Support for Blockchain Capital’s Security Token  CoinDeskCryptocurrency custodian BitGo Trust Company is adding support for the BCAP security token from venture capital firm Blockchain Capital. Revealing the news ...
Elsevier exposes users’ emails and passwords online  Naked SecurityElsevier – publisher of scientific journals such as The Lancet – has left its users' passwords and email addresses lying around online. What Motherboard ...
#PollVault: More Politics on National Security, and 'Corruption' Hidden in Diaries  The WireEvery morning till the elections, The Wire's reporters and editors bring you Poll Vault – a summary of the most important political developments, all in one place.
How Acapulco Exemplifies Mexico's Ongoing Security Crisis  ForbesThe afternoon sun is already starting to fade over the mountains overlooking the bay, in the city of Acapulco on a picturesque section of beach on Mexico's ...
Pat Gelsinger On VMware's 'Radical' Security Plan And Andy Jassy 'Bro Hugs'  CRNFive years ago, I stood on stage and said, 'If you use Amazon, you're stupid.' And Andy [Jassy] would stand on stage and say, 'If you run a data center, you're ...
Strengthen Your Retirement Security in 7 Steps  Yahoo NewsRetirement security is the ability to live a comfortable retirement without the burden of financial stress. Early planning is the best way to ensure a financially ...
Security strengthened at Gulshan, Banani and Baridhara ahead of Independence Day  bdnews24.comPolice say they have considered recent violent incidents in different countries, including the mosque shootings in New Zealand, and Mar 26 Independence Day ...
Capital’s security guards gave BJP its latest poll watchword  The Hinduchowkidar Chaukanna Hai slogan came up at Delhi Ke Mann Ki Baat meetings.
New Coalition Cyber Policy for Manufacturers Covers Security Failures, Data Breaches  Insurance JournalCoalition, a cyber insurance company for small and midsize businesses, has launched a full-spectrum coverage to insure manufacturers against security failures ...
Coronation Street’s Simon Gregson returns to set with high security after armed raid on set  The SunTHE soap star had been seen filming with the Corrie team after their set was robbed last week. Security measures have been beefed-up since an armed crook ...

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

How to Prevent Online Identity Theft

Identity theft rates one of the fastest growing crimes in... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More