As technical security improves, human security vulnerabilities are increasingly in the bulls-eye. For a fresh look at social engineering, and how best to defend against it, there’s no better source than a hacker. So, I reached out to Cliff Smith, Ethical Hacker & CISSP at Parameter Security, for his take on the current social engineering battleground. Here’s what he shared:
Confidence games have been around forever. Is there anything fundamentally different about social engineering practiced by hackers?
Modern social engineering is no different than the classic con games. They all run on information, trust, and emotions. The biggest change in the past 20 years or so is that technology makes the attacker’s job much easier, for several reasons. First, a skilled practitioner can use countless tactics to make their first contact appear more legitimate, such as spoofing a message’s source or creating a legitimate-looking website. Second, the average user operates on autopilot much of the time when using their phones or computers. It’s so easy, for example, to click on a link without stopping to think about the danger, which makes phishing attacks much more likely to succeed. Third, technology makes the consequences of social engineering much more dire. In just a few clicks, you can accidentally ruin your financial life, or someone else’s.
It’s commonly understood that phishing is a problem, and that phishing is a deceptive email with a malicious link. Is it that simple, or are there other social engineering attacks to be concerned about?
Continue Reading If you teach a man to phish …

Whew – we’ve survived yet another round of states enacting or amending their PII breach notification laws. If a trial lawyer’s vacation is the time between her question and the witness’s answer, a data security lawyer’s vacation is when state legislatures are out of session.
If you had a choice between doctors to perform surgery on you, which would you pick: a doctor who has sat through training on how to perform an appendectomy; or assurance that your doctor will successfully perform your appendectomy?
The indictment filed last Friday by Special Counsel Robert Mueller explains how Russian military intelligence officers hacked into computer systems of the DNC, the DCCC, and Clinton Campaign employees during the 2016 presidential race. With sweeping, specific details that have compelled unanimous confidence among Americans (except apparently
How time flies. Seventeen years ago, I went to work for a small, visionary company based in Seattle—Computer Forensics, Inc. Indeed, the founder was so early in the e-discovery and forensics industry that our URL was forensics.com. Laptop drives typically had 8 GB of storage, and servers were more often than not simply a bigger box that sat in a closet.
It’s 4:20 p.m. on Friday. You’re looking forward to meeting your friends soon for happy hour at the local bar. Your boss is on vacation, and you’re caught up for the week. All is well. As you take one last look at your email, you see a message has just arrived from one of your suppliers – marked URGENT. The supplier is ranting about why you didn’t send payment for last month’s invoice to the right bank account. They’ve contacted your boss, who they say was irate at being disturbed while in Madrid on vacation, and who told them to contact you personally for immediate resolution. They helpfully provide the correct bank routing information and demand the payment be made today. Your authority for wire transfers ($1M) will easily cover the request for $250,000, with change. The invoice amount sounds about right, you know the supplier, your boss is already upset, it’s Friday, and so you wire the funds.
The grousing began within 24 hours of Equifax’s
At last!!! A good reason not to create dozens of hard-to-remember passwords! The updated