IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Social Engineering

RSS Feed   
DEFINITION: Pretexting is a form of social engineering in which an individual lies about his identity or purpose to obtain privileged data about another individual. A pretexter may then use this data to engage in identity theft or corporate espionage. Pretexting may be employed by telephone or email, through customer service instant messaging or a company Web site. A pretexter may use a variety of strategies  … 

Social Engineering definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Social Engineering Reports
 
Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by SearchSecurity.com
EGUIDE: Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Web Security Technical Deep Dive
sponsored by Mimecast
WHITE PAPER: In this time of uncertainty, cloud and internet-based technologies are under greater threat than ever before. An influx of malware and phishing attacks means that businesses, if not properly protected, are in jeopardy. Read this technical deep dive to learn what you can do to ramp up web security.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Mimecast

Is Your Company’s Online Security Strategy Enough?
sponsored by Inky Technology
RESOURCE: Cyberattacks are costly - $10.2 billion in the U.S. alone to be exact. It’s proven that businesses are underprepared for cyberattacks, and what’s more is that every person at an organization who has an email account is vulnerable to threats. Read this article on how you can improve email security and get access to a free demo download.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Inky Technology

100 Days of Coronavirus (COVID-19)
sponsored by Mimecast
WHITE PAPER: To better understand how the coronavirus pandemic has been (and will be) exploited by malicious users, Mimecast created this analyst report, 100 Days of Coronavirus (COVID-19), which analyzes activity across the first 100 days. Download the report to unlock the key trends and recommendations.
Posted: 15 Jul 2020 | Published: 31 May 2020

Mimecast

Hacker Personas A Deeper Look Into Cybercrime– The Impersonator
sponsored by Webroot
RESOURCE: Humans are the weakest link and organizations must protect against social engineering attacks. Learn how to boost stay protected with security awareness training.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

TOPICS:  Phishing
Webroot

Threat intelligence report
sponsored by Mimecast
WHITE PAPER: The Mimecast Threat Intelligence Report: RSA Conference Edition provides a comprehensive analysis of the key findings, trends and recommendations observed by Mimecast’s Threat Center team from October to December 2019. Download the report to discover their results – such as the rise of significant cyberattack campaigns by 145% over last quarter.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Mimecast

Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.
Posted: 12 Jun 2017 | Published: 13 Jun 2017

ComputerWeekly.com

Cloud Email Needs Cloud Security
sponsored by Cisco Umbrella
RESOURCE: 90% of breaches occur via email, and in today’s cloud-centric world, built-in email security may not be enough. In order to secure Microsoft 365 from threats inside and outside of your mailbox, businesses need to consider email security that’s built for the cloud. View this infographic to learn more and to discover another security opportunity.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Cisco Umbrella

Create an Effective Email Phishing Test in 7 Steps
sponsored by Cisco Umbrella
EGUIDE: The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.
Posted: 22 Nov 2019 | Published: 21 May 2018

Cisco Umbrella

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences