Quantcast
Channel: Social engineering – The blog of content protection
Browsing all 12 articles
Browse latest View live

SMS: Nice piece of social engineering

This morning, I received on my cellular the following SMS (translated from French): Info: This caller tried to call you at 09:47 without leaving a message. Unknown Number in your directory > Call...

View Article


Predictably Irrational

“Predictably Irrational” from Dan Ariely is not a book about security (neither Sci-Fi). Thus, why do I report about it? “Predictably Irrational” highlights that many of our reactions are not rational....

View Article


Ghost in the Wires

Or the official biography of Kevin Mitnick.   In the 90s, Kevin Mitnick was known as the World Most Wanted Hacker.  He is an artist of social engineering.   His book “The Art of Deception” is a...

View Article

You are what you wear

Usual knowledge is that what you are wearing has some influence on the perception of your interlocutors.   When visiting a therapist, would you  trust more the one  in shorts and torn tee shirt than...

View Article

Why do Nigerian scammers say they are from Nigeria?

Nigerian scam is a generic term for the category of scams that always follow the same scheme: the widow/lawyer/son/exiled person has a huge sum of money blocked somewhere.  They need the help of a...

View Article


Security Newsletter 22 is available

The  Security Newsletter 22 is available. We are proud to have as guest Joan DAEMEN. Joan is one of the authors of KECCAK, the new algorithm selected by NIST to become the new official SHA-3 function....

View Article

Favor helps

If you do favor to one person, will this person more likely comply to your request? Dennis Regan studied this question in 1971. The purpose was to validate: Subject is more likely to respond your...

View Article

Social engineering and catastrophes

Recently, I visited a security company. They presented their new impressive Security Operational Centers. The security analysts had a continuous update of the sanity of their networks, the most...

View Article


Cloud services as Command and Control

Cloud services are increasing the surface of attack of corporate networks.   For instance, we  associate usually to file sharing services the risk of leak of confidential information.  This is a real...

View Article


Stealing account with mobile phone-based two-factor authentication

Attackers often entice users to become the weakest link.   Phishing and scams exploit the human weakness.  These attacks become even creepier if the attacker circumvents legitimate security mechanisms....

View Article

A “charitable” ransomware

This is not a joke. Heimdal Security disclosed a new variant of ransomware combining CryptoWall 4 and CryptXX. It has all the usual components of ransomware. The ransom itself is high: five bitcoins...

View Article

Image may be NSFW.
Clik here to view.

Law 7 – You Are the Weakest Link

This post is the seventh post in a series of ten posts. The previous post explored the sixth law: Security is not stronger than its weakest link.  Although often neglected, the seventh law is...

View Article
Browsing all 12 articles
Browse latest View live