Jun 26

Social Engineering Attacks and Mitigations Part III: Dumpster Diving

Considering various types of Social Engineering attacks, realize that all of them can be dangerous and have detrimental effects on the entire organization. Many people believe they know the different kinds of Social Engineering and how to avoid them, but they really only know a few different methods, mostly on the cyber side. While many of these attacks are cyber, there are also plenty that are physical. This week, we will look into the dirty job of dumpster diving and how to prevent it.

read more →
Jun 22

Social Engineering Attacks and Mitigations Part II: Shoulder Surfing

Shoulder surfing is something that most people do every day in one way or another. Most of the time, this simple practice is done without the intention of stealing information. This practice can be used for malicious purposes however, so it is important to prevent unwanted parties from viewing confidential information or trade secrets displayed on your screen.

read more →
May 31

Social Engineering Attacks and Mitigations Part I

Social Engineering is a security term that may be thrown around in corporate offices numerous times a week, month, or quarter, but does everyone at your company know what it really means?

read more →
Mar 08

Not all Threats are Cyber Part Two

Last week, I mentioned the assassination of a Chinese shipping executive who was killed in his car while parked near an upscale market in Karachi, Pakistan.

read more →
Mar 05

EvilOSX

On February 14th, 2018, a new variant of an OS X RAT called “EvilOSX” has appeared on Github.

read more →
Feb 28

Not all Threats are Cyber

On the 7th of February, I read a news article with great interest. The article was about a Chinese shipping executive who was gunned down and murdered in Karachi, Pakistan. His car was “riddled with bullets,” yet a passenger was unharmed.

read more →
Feb 26

The Skiddies are Playing Dress-up

Script kiddies (Skiddies) are often the butt of many jokes from both security professionals and seasoned hackers alike, but they may have finally found a way to become a real threat.  Not necessarily an information security risk, like traditional hackers, but a financial risk. 

read more →
Feb 21

Social Media: The Overlooked Critical Infrastructure of Chinese Manufacturing

It is no doubt that social media has a hold on people around the world, but it has an especially mesmerizing effect on the factory workers of China’s migrant manufacturing towns. 

read more →
Feb 06

Critical Vulnerability Found in Grammarly Spell Checker

Researchers have discovered a critical vulnerability in the Google Chrome and Firefox browser extension for the grammar checking software Grammarly. 

read more →