IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Social Engineering

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Pretexting is a form of social engineering in which an individual lies about his identity or purpose to obtain privileged data about another individual. A pretexter may then use this data to engage in identity theft or corporate espionage. Pretexting may be employed by telephone or email, through customer service instant messaging or a company Web site. A pretexter may use a variety of strategies  … 
Definition continues below.
Social Engineering White Papers (View All Report Types)
 
The Dangers of Phishing: Help Employees Avoid the Lure of Cybercrime
sponsored by Kaspersky Lab
WHITE PAPER: According to Kaspersky Labs, 48% of all phishing attacks were focused on gleaning users' financial data. This white paper reveals how to identify a phishing attack and how to protect your business from being targeted by phishing attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

Internet Security Threat Profile in Numbers
sponsored by Symantec
WHITE PAPER: Which industries receive the most email attacks, including malware, phishing and spam?
Posted: 05 Dec 2017 | Published: 05 Dec 2017

Symantec

Anti-Phishing Best Practices: Keys to Aggressively and Effectively Protecting Your Organization from Phishing Attacks
sponsored by Cyveillance
WHITE PAPER: Phishing has become one of the most common and effective online scams and can cost your company thousands of dollars. Download this new white paper and discover seven key objectives of an effective phishing protection and response plan.
Posted: 14 Nov 2006 | Published: 01 Apr 2006

Cyveillance

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

The Top Six Risks of Employee Internet Use and How to Stop Them
sponsored by St. Bernard Software
WHITE PAPER: Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization.
Posted: 10 May 2010 | Published: 10 May 2010

St. Bernard Software

Phishing and Web Security
sponsored by Webroot
WHITE PAPER: This brief whitepaper explores why businesses need to prepare for phishing 2.0 and why this new cybercrime is aiming its sights at your business.
Posted: 29 Apr 2014 | Published: 31 Dec 2013

Webroot

Study commissioned by Webroot: Web Threats Expose Businesses to Data Loss
sponsored by Webroot
WHITE PAPER: Eight in 10 companies experienced web-borne attacks in 2012. Don't be part of the statistic! Read this research paper to learn about the current state of web layer security in organizations today and learn what you should do to stay protected.
Posted: 20 Mar 2013 | Published: 06 May 2013

Webroot

Protecting Commercial Online Banking Customers from Next-Generation Malware
sponsored by IronKey
WHITE PAPER: Cybercriminals are now using advanced malicious software (malware) to attack the computers of finance professionals in companies and government agencies. Read this paper now to learn how your business can stay protected from these threats.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

IronKey

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

The Trouble Heading for Your Business 2013
sponsored by Trend Micro
WHITE PAPER: This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
Posted: 16 Apr 2013 | Published: 28 Feb 2013

Trend Micro
 
 
SOCIAL ENGINEERING DEFINITION (continued): …  to obtain personal information. In one scenario, for example, the pretexter might call an individual claiming affiliation with a bank, survey firm or credit agency. In another scenario, a pretexter might claim to be a customer, client or employee of a company to gain access to phone or electronic records. After establishing trust with the targeted individual, the pretexter might ask a series of questions designed to gather key individual identifiers (like social security numbers, mother's maiden name, place or date of birth, or account numbers) under the guise of needing to confirm the individual's … 
Social Engineering definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement