In Pictures: 7 social engineering scams and how to avoid them
Even the most savvy IT professionals can fall victim to social engineering attacks. Here’s how to recognize these threats and avoid falling prey to them.
Even the most savvy IT professionals can fall victim to social engineering attacks. Here’s how to recognize these threats and avoid falling prey to them.
Receiving an email to connect to someone on LinkedIn turned out to be a social engineering experiment that Trend Micro's global field enablement vice president, Blake Sutherland, will never forget.
CIO.com goes undercover (sort of) at GrrCon, the Midwest's premier conference on penetration testing and software security, to learn about cloud security, hacking, lock picking and more.
If the Internet is the new Wild West, then hackers are the wanted outlaws of our time. And like the gun-slinging bad boys before them, all it takes is one wrong move to land them in jail.
The latest social engineering trick to get victims to open malicious email attachments accuses them of being spammers and threatens to sue them if they don't stop.
Your computer files are being held for ransom. Pay up, or lose them. Your bank account is being emptied, so click here to stop it. Your friend has died, click on this funeral home site for more information. Social engineering thugs have reached new lows.
Securities firms must navigate a range of opportunities and pitfalls to stay ahead of the competition. You have to deliver services across multiple devices and platforms, day and night, to both customers and employees. Unless these services deliver the latest, most accurate information, traders and firms can quickly lose the edge to competitors—along with revenue opportunities.