Date Author Title
2024-12-05Jesse La Grew[Guest Diary] Business Email Compromise
2024-04-11Yee Ching TokEvolution of Artificial Intelligence Systems and Ensuring Trustworthiness
2022-11-29Johannes UllrichIdentifying Groups of "Bot" Accounts on LinkedIn
2022-03-02Johannes UllrichThe More Often Something is Repeated, the More True It Becomes: Dealing with Social Media
2019-03-21Xavier MertensNew Wave of Extortion Emails: Central Intelligence Agency Case
2017-07-16Renato MarinhoSMS Phishing induces victims to photograph its own token card
2015-11-21Didier StevensMaldoc Social Engineering Trick
2014-08-20Kevin ShorttSocial Engineering Alive and Well
2014-01-24Chris MohanPhishing via Social Media
2013-07-13Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2013-07-08Richard PorterWhy do we Click?
2013-02-25Johannes UllrichMass-Customized Malware Lures: Don't trust your cat!
2012-04-06Johannes UllrichSocial Share Privacy
2011-05-25Lenny ZeltserMonitoring Social Media for Security References to Your Organization
2011-05-10Swa FrantzenChanging MO in scamming our users ?
2010-12-29Daniel WesemannBeware of strange web sites bearing gifts ...
2010-11-22Lenny ZeltserBrand Impersonations On-Line: Brandjacking and Social Networks
2010-09-16Johannes UllrichFacebook "Like Pages"
2010-07-07Kevin ShorttFacebook, Facebook, What Do YOU See?
2010-06-14Manuel Humberto Santander PelaezNew way of social engineering on IRC
2010-06-10Deborah HaleTop 5 Social Networking Media Risks
2010-05-07Johannes UllrichStock market "wipe out" may be due to computer error
2010-05-02Mari NicholsZbot Social Engineering
2010-04-29Bojan ZdrnjaWho needs exploits when you have social engineering?
2010-04-13Johannes UllrichMore Legal Threat Malware E-Mail
2009-07-31Deborah HaleDon't forget to tell your SysAdmin Thanks
2009-06-01G. N. WhiteYet another "Digital Certificate" malware campaign
2009-04-24Pedro BuenoDid you check your conference goodies?
2009-01-18Maarten Van HorenbeeckTargeted social engineering