Ride hailing giant Uber confirms 'cybersecurity incident', amid report that 18 year old hacker accessed its network via social engineering
Bitcoin scam sees Twitter accounts of Elon Musk, Jeff Bezos, Bill Gates, as well as Barack Obama, Joe Biden and…
Nearly all businesses have suffered some form of phishing attack during the past year, survey finds
We pesky humans are responsible for 90 percent of cloud data breaches, with social engineering a major concern
Hacker who tried to secure an early release for a friend will instead go to jail himself
Pesky humans still falling victim to social attacks, Verizon report finds, but ransomware has become the largest malware threat
Meltdown and Spectre patch issues continue with scammers now getting in on the act
Recent events mean ransomware is a hot topic among our readers as DDoS fears ease, but humans are still seen…
It seems no organisation is safe from cyber criminals as Saudi Arabian government becomes the latest target
Ashley Madison users are now prime targets for blackmail, warn security experts
The definitive definition of social engineering from the experts for the kids (and grown ups, too)
Salarymen find new sources of income by running porn blackmail scam
you need to test your organisation's security. But social engineering tests aer an ethical minefield, says Eric Doyle
Information about friends, family and colleagues of NATO's most senior admniral were harvested by social engineering attack
A device that looks like a power supply can leave a network wide open to attacks
The Chinese government may have breached the US Chamber of Commerce and stolen Asian policy information
DefCon staged a social engineering test on 14 major companies which harvested information with ease
IT needs to become more aware of the dangers posed by social engineering, warns Check Point’s Terry Greer-King
Hackers choose the path of least resistance and manipulating your colleagues is the simplest route to your data, warns Eric…
Letting workers bring their own devices to the office allows malware to outpace the security measures available, says Eric Doyle
Auditors at Trace Security used social engineering tactics to obtain sensitive information and infect systems