TITLE

Social engineering attacks on the rise

AUTHOR(S)
Grant, Ian
PUB. DATE
November 2007
SOURCE
Computer Weekly;11/27/2007, p1
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports that the Sans Institute's latest annual list of the top 20 attack targets will reveal that criminals are increasingly using social engineering attacks to penetrate corporate information technology (IT) defences. Alan Palier, research director at the Sans Institute, said criminals are turning to indirect attacks, such as tricking staff into revealing passwords, or planting malicious code on Websites. The Sans research found an increase in hackers planting malicious code on corporate Web sites.
ACCESSION #
27963136

 

Related Articles

  • Superzapping in Computerland. Golden, Frederic; Faflick, Philip; U.S., other // Time;1/12/1981, Vol. 117 Issue 2, p88 

    The article discusses the increase in computer crimes and the safety measures being taken by computer users. It is stated that several companies reported of their circuits being plagued by electronic interlopers and the police traced a gang of 13-year old children who hacked the systems. As...

  • Hacker Taggers: A new type of hackers. Warren, Matthew; Leitch, Shona // Information Systems Frontiers;Sep2010, Vol. 12 Issue 4, p425 

    Organisations often spend large sums of money to ensure that they are protected against the risks associated with online attacks. The perceived threats against organisations are well known and the losses can be easily quantified. This perceived threat is usually portrayed by the media as being...

  • Businesses must gen up on full disc encryption. Ashforo, Warwick // Computer Weekly;2/24/2009, p10 

    The article reports that full disc encryption (FDE) is tipped to be the top security technology for information technology (IT) departments in 2009, but it may not offer a quick and easy fix. IT user organisations and security experts warn that while encryption could keep auditors, regulators...

  • Hackers face longer jail sentences under plans to update the Computer Misuse Act. Goodwin, Bill // Computer Weekly;7/6/2004, p8 

    New laws will give Great Britain police powers to extradite criminals from overseas. The government has committed to introducing tougher computer crime laws that could quadruple prison sentences for hackers. The new laws could also give police stronger powers to extradite computer criminals...

  • Hackers turn to client apps. Roberts, Paul F. // eWeek;11/21/2005, Vol. 22 Issue 46, p14 

    The article informs that vulnerabilities in Web and client/server applications are becoming the new battleground in the war against malicious hackers, as holes in network perimeters and Web servers become harder to find and exploit. Vulnerability research by Qualys Inc., of Redwood Shores,...

  • Electronic security threats come from outside and within. Greenwald, Judy // Business Insurance;5/23/2005, Vol. 39 Issue 21, p11 

    The article informs that besieged companies are facing both internal and external threats to their Internet security, and the danger is growing. Most attacks are inspired by a wide variety of nonpecuniary motives that range from the desire to learn a colleague's salary to the possibility of...

  • Heroic Hacks and Inspired Work-arounds. McAllister, Neil // InfoWorld;5/29/2006, Vol. 28 Issue 22, p26 

    The article talks about heroic hacks. To a real hacker, there is nothing really as satisfying as the execution of a really great hack. A good hack is considered the computing equivalent of duct tape and a penknife. It gets the job done on time and the budget and materials at hand. A truly great...

  • Watching Our Backs. Udell, Jon // InfoWorld;9/25/2006, Vol. 28 Issue 39, p44 

    The article discusses the advantages of the human capability to memorize visual and auditory patterns and notice deviations from them in relation to detecting a cyberattack. Even computer security professionals know that there is no defense against a determined attacker. The presumption that...

  • e-security.  // Fortune;1/22/2001, Vol. 143 Issue 2, special advertising section pS1 

    The article focuses on the need for business leaders in the U.S. to understand the concept of electronic-security, also known as e-security, and the danger it poses. A number of e-security breaches occurred in 2000 as big companies, such as Microsoft, Yahoo! and Bloomberg, were attacked by...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics