IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Social Engineering

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Pretexting is a form of social engineering in which an individual lies about his identity or purpose to obtain privileged data about another individual. A pretexter may then use this data to engage in identity theft or corporate espionage. Pretexting may be employed by telephone or email, through customer service instant messaging or a company Web site. A pretexter may use a variety of strategies  … 
Definition continues below.
Social EngineeringMultimedia (View All Report Types)
 
Countdown: Top 5 next-generation messaging attacks that antivirus can't catch
sponsored by Symantec Hosted Services
PODCAST: Malicious messaging attacks; such as embedded code in Web pages, worms in downloads, PDFs and GIF images and more; are wreaking havoc on enterprise IT system. How do these attacks work and what can you do?
Posted: 15 Apr 2007 | Premiered: Apr 17, 2007, 09:00 EDT (13:00 GMT)

Symantec Hosted Services

Messaging Security: Understanding the Threat of eMail and IM Attacks
sponsored by Symantec Corporation
PODCAST: Mike Cobb, Founder and Managing Director of Cobweb Applications Ltd., investigates the severity of phishing and IM virus threats, and spends time assessing the effectiveness and requirements of unified messaging security products.
Posted: 10 Nov 2006 | Premiered: Nov 14, 2006, 09:00 EST (14:00 GMT)

Symantec Corporation

Podcast - Emerging security threats: Know your enemy in 2014
sponsored by BitGlass
PODCAST: In this podcast, discover the process that cybercrime undergoes and how it directly effects the victim.
Posted: 10 Jul 2014 | Premiered: Jun 24, 2014


Guarding Against Next-Gen Spam/ Phishing Attacks
sponsored by Symantec Hosted Services
WEBCAST: This Webcast examines state-of-the-art defenses in email attacks and looks specifically at the technological and management requirements facing these new threats.
Posted: 15 Apr 2007 | Premiered: Apr 17, 2007, 09:00 EDT (13:00 GMT)

Symantec Hosted Services

Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky Lab

This Month in the Threat Webscape for October 2009
sponsored by Websense, Inc.
VIDEO: The Websense Security Labs Threatscape delivers information about breaking security research topics and today's advanced Internet threats. This Month's 'In the Threatscape' is a review of October's Web threat activity. Watch the video to learn more.
Posted: 20 Nov 2009 | Premiered: 10 Nov 2009

Websense, Inc.

An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
sponsored by Ping Identity Corporation
VIDEOCAST: Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
Posted: 11 Aug 2009 | Premiered: Aug 11, 2009

Ping Identity Corporation

Podcast: Cutting Infrastructure Costs by Stopping Unwanted Mail at the Perimeter: Introduction to Stopping Unwanted Mail
sponsored by Sendmail, Inc.
PODCAST: This new Ask the Expert podcast series focuses on how businesses can significantly cut costs by modernizing their messaging infrastructure and stopping unwanted mail from ever touching it.
Posted: 03 Nov 2008 | Premiered: Oct 31, 2008

Sendmail, Inc.

TechTalk: Stop Malware at the Web Gateway
sponsored by BlueCoat
WEBCAST: Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.
Posted: 14 May 2009 | Premiered: Mar 24, 2009

BlueCoat

Death and Taxes...and Hackers
sponsored by Imperva
VIDEO: View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011

Imperva
 
 
SOCIAL ENGINEERING DEFINITION (continued): …  to obtain personal information. In one scenario, for example, the pretexter might call an individual claiming affiliation with a bank, survey firm or credit agency. In another scenario, a pretexter might claim to be a customer, client or employee of a company to gain access to phone or electronic records. After establishing trust with the targeted individual, the pretexter might ask a series of questions designed to gather key individual identifiers (like social security numbers, mother's maiden name, place or date of birth, or account numbers) under the guise of needing to confirm the individual's … 
Social Engineering definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement