Shari Lawrence Pfleeger wrote the book on cyber security – or should we say “books.” The longtime researcher and expert has authored numerous textbooks on everything from software engineering, to the application of metrics in software development, to computer security. The head of research for the Institute for Information Infrastructure Protection (I3P) at Dartmouth College, Pfleeger says that many of the biggest challenges facing organizations in the realm of cyber security are social, and not technological.
Browsing Category: Social Engineering
VIEW SLIDESHOW Five Security Predictions for 2012What will 2012 bring? We can’t know for sure. Recent years have taught us that, when it comes to computer security, one should expect to be surprised.
Amnesty International’s United Kingdom website was compromised late last week and was being used to exploit a known Java runtime environment hole on machines belonging to unwitting visitors to the site, according to Barracuda Labs researcher, Paul Royal.
Call it a new twist on Facebook “Like” jacking. Researchers at the firm Zscaler say that scammers are embedding Facebook “Like” widgets from top ranked Web brands and in Web pages used to promote online scams or distribute malware. The widgets make it appear as if tens- or hundreds of thousands of Facebook users ‘like’ the scam Web site.
VIEW SLIDESHOW Threatpost Top Security News Stories of 2011We’ve compiled our list of the Top Security Stories of 2011, presented here in no particular order. These are the issues that shook the world’s markets and kept us awake at night.
USAA is warning its members about a sophisticated phishing scam that attempts to install a malicious banking Trojan on members computers.
Investigations by the BBC suggest a widening probe into alleged computer hacking by UK newspapers. In all, the computer hacking may have been as widespread as now-notorious voicemail hacking conducted by reporters at Rupert Murdoch’s News of the World, and may have compromised classified British intelligence from government officials, the reports say.
Peddlers of ransomware are increasing their effectiveness by tailoring region-specific versions of a scam that impersonates local police.
The latest generation of desk-jockey’s admitted in a recent CISCO study that they frequently ignore and/or circumvent the information technology (IT) policies of their employers, heightening corporate risk.
Be careful of what you ask for. That’s a lesson that Max Schrems of Vienna, Austria, learned the hard way when he sent a formal request to Facebook citing European law and asking for a copy of every piece of personal information that the world’s largest social network had collected on him.