Honey-trappers are posing as beautiful women online to talk to vulnerable men In Mia Ash’s situation, the profile was used to steal corporate and strategic plans The internet appears to offer a new level of persuasion to honey-trappers The techniques bear close similarities to those used by spies trawling for secrets By John Naish for the… Continue reading A very modern honey trap: Mia is 30, alluring and looking for love. No wonder middle-aged executives fell for her. There’s just one HUGE problem…
Meet Mia Ash, the Fake Woman Iranian Hackers Used to Lure Victims ANDY GREENBERG 07.27.17 10:00 AM MIA ASH IS a 30-year-old British woman with two art school degrees, a successful career as a photographer, and plenty of friends—more than 500 on Facebook, and just as many on LinkedIn. A disproportionate number of those friends happen to be… Continue reading MEET MIA ASH, THE FAKE WOMAN IRANIAN HACKERS USED TO LURE VICTIMS
Guest post by Brian Tarling on a much-needed subject. </end editorial> Published on May 5, 2017 Brian Tarling Director CEO at All Source Fusion LLC My time as a “hackerish” Professional taught me that Social Engineering is one of the most difficult tasks to defend against. You see with the advent of social media its… Continue reading Social Engineering
Mirko Zorz – Editor in Chief May 19, 2016 A clean-cut guy with rimmed glasses and a warm smile, Jayson E. Street looks nothing like the stereotypical hacker regularly portrayed in movies (i.e. pale, grim and antisocial). But he is one – he just “hacks” humans. Street is a master of deception: a social engineer, specializing… Continue reading The life of a social engineer: Hacking the human
Does anyone know an example(s) of Social Engineering using Social Media? +1 if it was somehow connected with a Foreign Intelligence Service… This question is precipitated by a ‘Navy Captain’ requesting me as a contact on LinkedIn. If he is authentic, then he is very senior. I asked a number of our ‘mutual contacts’ and… Continue reading Request for Information: Social Engineering using Social Media
Most people lack computer user education, plain and simple. Most people turn on their computer, sigh when they have to enter their password (if they have one at all) and start using their computer to read email, cruise through their favorite website, do some online shopping and perhaps banking. They might watch videos, read some… Continue reading Are YOU Cyber savvy?
Mitnick’s Tale Sheds Light on Social Tactics – Dark Reading. Lesson from the past: Targeted companies need good security processes to protect their data. Excellent blog article. Kevin Mitnick was a very good hacker but he was an even better social engineer. We ALL need to be aware what he did, how and why… because… Continue reading Mitnick’s Tale Sheds Light on Social Tactics – Dark Reading