Diaries by Keyword: social engineering

DateAuthorTitle

SOCIAL ENGINEERING

2013-07-08Richard PorterWhy do we Click?
2011-05-10Swa FrantzenChanging MO in scamming our users ?
2010-12-29Daniel WesemannBeware of strange web sites bearing gifts ...
2010-06-14Manuel Humberto Santander PelaezNew way of social engineering on IRC
2010-05-02Mari NicholsZbot Social Engineering
2010-04-29Bojan ZdrnjaWho needs exploits when you have social engineering?
2010-04-13Johannes UllrichMore Legal Threat Malware E-Mail
2009-06-01G. N. WhiteYet another "Digital Certificate" malware campaign
2009-04-24Pedro BuenoDid you check your conference goodies?
2009-01-18Maarten Van HorenbeeckTargeted social engineering

SOCIAL

2014-01-24Chris MohanPhishing via Social Media
2013-07-13Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2013-07-08Richard PorterWhy do we Click?
2013-02-25Johannes UllrichMass-Customized Malware Lures: Don't trust your cat!
2012-04-06Johannes UllrichSocial Share Privacy
2011-05-25Lenny ZeltserMonitoring Social Media for Security References to Your Organization
2011-05-10Swa FrantzenChanging MO in scamming our users ?
2010-12-29Daniel WesemannBeware of strange web sites bearing gifts ...
2010-11-22Lenny ZeltserBrand Impersonations On-Line: Brandjacking and Social Networks
2010-09-16Johannes UllrichFacebook "Like Pages"
2010-07-07Kevin ShorttFacebook, Facebook, What Do YOU See?
2010-06-14Manuel Humberto Santander PelaezNew way of social engineering on IRC
2010-06-10Deborah HaleTop 5 Social Networking Media Risks
2010-05-02Mari NicholsZbot Social Engineering
2010-04-29Bojan ZdrnjaWho needs exploits when you have social engineering?
2010-04-13Johannes UllrichMore Legal Threat Malware E-Mail
2009-06-01G. N. WhiteYet another "Digital Certificate" malware campaign
2009-04-24Pedro BuenoDid you check your conference goodies?
2009-01-18Maarten Van HorenbeeckTargeted social engineering

ENGINEERING

2013-07-08Richard PorterWhy do we Click?
2012-09-14Lenny ZeltserAnalyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-06-04Lenny ZeltserDecoding Common XOR Obfuscation in Malicious Code
2011-05-10Swa FrantzenChanging MO in scamming our users ?
2010-12-29Daniel WesemannBeware of strange web sites bearing gifts ...
2010-11-18Chris CarboniStopping the ZeroAccess Rootkit
2010-06-14Manuel Humberto Santander PelaezNew way of social engineering on IRC
2010-05-02Mari NicholsZbot Social Engineering
2010-04-29Bojan ZdrnjaWho needs exploits when you have social engineering?
2010-04-13Johannes UllrichMore Legal Threat Malware E-Mail
2009-06-01G. N. WhiteYet another "Digital Certificate" malware campaign
2009-04-24Pedro BuenoDid you check your conference goodies?
2009-01-18Maarten Van HorenbeeckTargeted social engineering