Category: Social Engineering

Malware Authors Jumping on the Obama Bandwagon

Malware Authors Jumping on the Obama Bandwagon

No surprise here, the malware authors are leveraging on the social engineering aspect of the US presidential elections. In less than half a day Google Adwords adverts and custom malware was popping up conning...

Scammers Using Asterisk VoIP Systems to Make Calls

Scammers Using Asterisk VoIP Systems to Make Calls

It seems like ‘vishing‘ (basically Phishing – but utilising VoIP call services) as it’s known is getting bigger, especially since the scammers have been using a flaw in Asterisk systems that allows them to...

Using Twitter for Data Mining and Information Gathering

Using Twitter for Data Mining and Information Gathering

We’ve mentioned Twitter a few times lately as it has become a larger and larger part of the social web and the premier ‘micro-blogging’ platform. There was a recent Phishing issue on Twitter and...

Michael Jackon Spam/Malware – RIP The King Of Pop

Michael Jackon Spam/Malware – RIP The King Of Pop

For people of my age and generation and I’d guess for most readers of Darknet, Michael Jackson would have had a great influence on our lives. The biggest news last week was most certainly...

Facebook E-mail Spam Conceals Malware Attack

Facebook E-mail Spam Conceals Malware Attack

Facebook has had a fair share of problems, being a large community of course it’s going to be a ripe target for spammers, scammers and malware distributors. The latest to hit is a spam...

Brittany Murphy Dies & Scareware Scammers Strike

Brittany Murphy Dies & Scareware Scammers Strike

It seems to be a trend now, whenever someone famous dies some kind of malware or phishing scam will pop up playing on their death with the usual social engineering aspect. The most memorable...

Malware Pushers Abuse Firefox Warning Page

Malware Pushers Abuse Firefox Warning Page

This is a pretty neat attack from the malware pushes leveraging on the ignorance of the average user – which in all honestly is a safe bet most of the time! You could consider...

The Social-Engineer Toolkit (SET) – Computer Based Social Engineering Tools

The Social-Engineer Toolkit (SET) – Computer Based Social Engineering Tools

The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was designed to be released with the http://www.social-engineer.org launch and has quickly became a standard tool in a...

VeriSign Demands The Power To Take Down Websites/Domains

VeriSign Demands The Power To Take Down Websites/Domains

I was scanning the news today, and nothing much was going on. There were some half-arsed stories about Anonymous and LulzSec – but nothing really worth writing about. And then, and then I spotted...

Social Engineering Vulnerability Evaluation and Recommendation Project

Social Engineering Vulnerability Evaluation and Recommendation Project

Social engineering has been around for tens of thousands of years so it is time we approach the topic in a professional manner. The Social Engineering Vulnerability Evaluation and Recommendation (SEVER) Project is one...

FoxOne Free OSINT Tool – Server Reconnaissance Scanner

FoxOne Free OSINT Tool – Server Reconnaissance Scanner

FoxOne is a free OSINT tool, described by the author (th3j35t3r) as a Non-Invasive and Non-Detectable Server Reconnaissance Scanner. Bypassing API limitations and currently detecting 6500+ vulnerable server paths/files – without ever touching the...

A Story Of Social Engineering – How @N Lost His $50,000 Twitter Handle

A Story Of Social Engineering – How @N Lost His $50,000 Twitter Handle

So last week I read an interesting tale about social engineering on Medium, a story by a chap named Naoki Hiroshima and his Twitter handle, which was @N. Yes just one letter, a pretty...

Social Engineering, Management, and Security

A BYOD dissonance between economic imperative and loss of central control? Discontented staff susceptible to social engineering? David Harley reflects on aspects of Business Reimagined, a new book by Dave Coplin, chief envisioning officer at Microsoft UK, interivewed by Ross McGuinness in Metro.

Hundreds of thousands of Facebook likes can certainly be wrong

Issues with malware are always with us. There may or may not be a current media storm, or companies hoping for a slice of the anti-malware pie by proclaiming the death of antivirus in a press release, but AV labs continue to slog their way every day through tens of thousands of potentially malicious samples.

Pin It on Pinterest