Search This Blog

Tuesday, February 17, 2009

9 Dirty Tricks: Social Engineers' Favorite Pick-Up Lines; Criminals using Skype

Some of the most common lines social engineers' are using to fool their victims
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Trend Micro
rule

Four Layers of Security Protection.
Web threats are coming at you from every angle. This whitepaper reveals how to protect your network at four different layers to successfully fight the latest web threats. The four layers of protection are deployed in the cloud, at the Internet gateway, across network servers and at the end points. Download this whitepaper now.

rule

Spotlight Story
9 Dirty Tricks: Social Engineers' Favorite Pick-Up Lines

By Joan Goodchild
What the average guy might call a con is known in the security world as social engineering. Social engineering is the criminal art of scamming a person into doing something or divulging sensitive information. These days, there are thousands of ways for con artists to pull off their tricks. Here we look at some of the most common lines these people are using to fool their victims.. Read full story

Related News:

Criminals using Skype, say Italian police The Italian police force has become the latest to voice complaints that the Skype VoIP service is undermining their use of wiretapping in criminal investigations.

Private Twitter alternatives If you like the Twitter interface for connecting with office colleagues, but want to keep your posts private, there are a number a couple of options available for building an invite-only microblogging network.

Conficker Worm Draws a Counter-Attack In response to the Conficker worm's massive infection of millions of PCs worldwide, industry heavyweights including Microsoft, Symantec and others Thursday announced they're forming a new team to fight back against the worm.

With global effort, a new type of worm is slowed There have been big computer worm outbreaks before, but nothing quite like Conficker.

ConSentry adds network audit and control software Network access control specialist ConSentry is moving away from pure NAC, and towards providing wider visibility and control over the network. It has developed software that uses the deep packet inspection chips built into its switches and controllers to track and audit all sorts of network activity.

Apple issues massive security update for Mac OS X Apple today issued multiple updates for Mac OS X and Java that patched 55 bugs, including one for its Safari Web browser that prompted a security researcher to blast the company for a half-hearted approach to security.

Data Protection Law Amended, Deadline Extended (Again) The Massachusetts Office of Consumer Affairs and Business Regulation on Thursday issued amendments, and an extension, to the state's tough data security regulations, known as Mass. 201 CMR 17.

How technology can repair the mortgage market All the problems of the mortgage crisis flow through two related facts: (1) The financial markets badly mispriced Mortgage-Backed Securities (MBS); and (2) Even going forward, nobody can think of a good management and incentive structure to keep that problem from recurring.
Repairing the mortgage market (Part 1 -- General overview) Repairing the mortgage market (Part 2 -- Technology overview) Repairing the mortgage market (Part 3 -- Security and privacy)

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Trend Micro
rule

Four Layers of Security Protection.
Web threats are coming at you from every angle. This whitepaper reveals how to protect your network at four different layers to successfully fight the latest web threats. The four layers of protection are deployed in the cloud, at the Internet gateway, across network servers and at the end points. Download this whitepaper now.

rule

Avoid the SMB Technology Quagmire
SMBs have concrete technology needs, but it's difficult to find cost-effective, easy to manage and secure solutions. Get real-world advice on how to complete this task in this Special Briefing, "Avoiding Techno-quicksand for Small and Medium Businesses." Find out how to select the right products for your organization today.
Download this Special Briefing now.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free

 

02/17/09

Today's most-read stories:

  1. Microsoft announces $250,000 Conflicker worm bounty
  2. Evolution of PCs, Macs, Internet, routing, cell phones, Microsoft Windows
  3. Palm pulls the plug on Palm OS, bets the future on Pre's webOS
  4. Largest coordinated ATM rip-off ever nets $9+ million
  5. Iridium calls may suffer outages from satellite crash
  6. Microsoft renames, expands free online services for higher-ed
  7. New amplifier paves way for 10Gbps wireless Web
  8. NSA identifies top 25 programming errors
  9. Rumor mill: Cisco to buy VMware?
  10. Did Borat help Cisco?


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: