IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Social Engineering

RSS Feed   
DEFINITION: Pretexting is a form of social engineering in which an individual lies about his identity or purpose to obtain privileged data about another individual. A pretexter may then use this data to engage in identity theft or corporate espionage. Pretexting may be employed by telephone or email, through customer service instant messaging or a company Web site. A pretexter may use a variety of strategies  … 

Social Engineering definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Social Engineering Reports
 
Understanding Phishing Attacks: Confusable Domains
sponsored by Inky Technology
WHITE PAPER: Phishing scammers are nothing if not clever. There has been a constant stream of devious innovation from attackers. One technique that attackers commonly use is confusable domains. In this white paper, learn how confusable domains work and how INKY Phish Fence can prevent confusable domain attacks at your organization.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

One Fish, Two Fish, Three Fish, Fraud Fish
sponsored by Splunk
RESOURCE: In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.
Posted: 10 May 2019 | Published: 10 May 2019

Splunk

Agile Software Testing Pioneer Slams the Door on C-level Email Attacks
sponsored by Barracuda
CASE STUDY: Learn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

Barracuda

Are You Getting Phishing Attacks in Outlook?
sponsored by Inky Technology
RESOURCE: IT security and infrastructure personnel are seeing a high volume of phishing attacks every day. This is why phishing alerts and anti-phishing software are so important. However, even if your organization uses phishing alerts in Outlook, they might not be solving the problem. In this blog, learn how INKY can help solve your phishing attack problem.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Inky Technology

The Deloitte Consumer Review: A more secure customer
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

ComputerWeekly.com

Office 365 Anti-Phishing Tools
sponsored by Cisco Umbrella
EGUIDE: Microsoft released a new set of anti-phishing tools available as part of Office 365 Advanced Threat Protection. However, for these features to be effective, administrators need to understand how to use the tools and how to properly implement them. Download this e-guide to learn more.
Posted: 06 Sep 2019 | Published: 04 Sep 2019

Cisco Umbrella

The Personalisation Challenge: Business Culture and Mobile Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Hewlett Packard Enterprise

Keeping Networks safe from Social Networking
sponsored by BlueCoat
EGUIDE: Social Networking has provided attackers with an innovative way to gain information from within your corporate networks. This expert E-Guide will provide you with the information needed to keep your organization safe from the threats of social networking.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

BlueCoat

Information Security Magazine November 2009: Stay in Control
sponsored by Information Security Magazine
EZINE: Unmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it. Read this magazine and find out how a consistent change management process puts you in charge.
Posted: 16 Nov 2009 | Published: 16 Nov 2009

Information Security Magazine

Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK: Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009

Sophos UK
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement