IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Social Engineering

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Pretexting is a form of social engineering in which an individual lies about his identity or purpose to obtain privileged data about another individual. A pretexter may then use this data to engage in identity theft or corporate espionage. Pretexting may be employed by telephone or email, through customer service instant messaging or a company Web site. A pretexter may use a variety of strategies  … 
Definition continues below.
Social EngineeringIT Downloads (View All Report Types)
 
Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky Lab

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Managementâ„¢ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AlienVault

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Innovators Demo Part II - Your Collaboration Destiny Continues
sponsored by IBM
PRODUCT DEMO: Embark on this interactive journey with the Innovators agents. They clearly show you how to think differently, act differently, communicate and collaborate in new ways - even while on the move - making you and your team more productive and connected.
Posted: 18 Jun 2010 | Premiered: 17 Jun 2010

IBM

ExtremeZ-IP: Could ExtremeZ-IP Help Your Business?
sponsored by Acronis
SOFTWARE DOWNLOAD: Find out if ExtremeZ-IP is right for your environment and can deliver a better experience for Mac users and your IT department.
Posted: 15 Oct 2013 | Premiered: 15 Oct 2013

Acronis

Hitachi IT Operations Analyzer Software
sponsored by Hitachi Data Systems
SOFTWARE DOWNLOAD: Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
Posted: 13 Nov 2009 | Premiered: 12 Nov 2009

Hitachi Data Systems

Deep Defender Blogs
sponsored by Intel
SOFTWARE DOWNLOAD: Find out why protecting your operating system no longer serves as enough security to keep your business safe. By downloading this software, you can see the results of stopping stealth attacks with endpoint security that goes beyond the operating system.
Posted: 03 Oct 2012 | Premiered: 03 Oct 2012

Intel

Worry-Free Business Security Advanced
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
Posted: 26 Oct 2010 | Premiered: 26 Oct 2010

Trend Micro, Inc.

Symantec Protection Suite Challenge
sponsored by Symantec Corporation
SOFTWARE DEMO: Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.
Posted: 28 Jul 2009 | Premiered: 28 Jul 2009

Symantec Corporation

Centrify Express 2010.1
sponsored by Centrify Corporation
SOFTWARE DOWNLOAD: Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings.
Posted: 06 Aug 2010 | Premiered: 06 Aug 2010

Centrify Corporation
 
 
SOCIAL ENGINEERING DEFINITION (continued): …  to obtain personal information. In one scenario, for example, the pretexter might call an individual claiming affiliation with a bank, survey firm or credit agency. In another scenario, a pretexter might claim to be a customer, client or employee of a company to gain access to phone or electronic records. After establishing trust with the targeted individual, the pretexter might ask a series of questions designed to gather key individual identifiers (like social security numbers, mother's maiden name, place or date of birth, or account numbers) under the guise of needing to confirm the individual's … 
Social Engineering definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement