Social Engineering

Identity Theft

Social Engineering Internet Security Whitepapers

Identity theft is a federal crime. It occurs when one person's identification (which can include name, social security number, or any account number) is used or transferred by another person for unlawful activities. The FBI calls identity theft one of the fastest growing crimes in the United States and estimates that 500,000 to 700,000 Americans become identity theft victims each year.

Identity Theft Assistance: Safeguarding Your Identity

Social Engineering Internet Security Whitepapers

Identity theft commonly begins with the loss or theft of a wallet or purse. But there are many other ways that criminals can get and use your personal information in order to commit identity theft.

Preventing Identity Theft: A Guide for Consumers

Social Engineering Internet Security Whitepapers

Few crimes have made people more anxious more quickly as the sudden onslaught of identity theft. It's in the newspapers every day and on the news every night. People are worried that someone’s going to run up charges on their credit cards or fleece their bank accounts while their backs are turned. And there’s some reason to worry: All a thief has to do is steal something as basic as a Social Security number to become a real public enemy. And while these crimes are relatively easy to commit, investigating and prosecuting them are complex and timeconsuming matters. So it’s up to all of us to be identity-smart and make sure we keep this crime from spreading. It’s a battle we can win. Follow the tips in this booklet, be careful, and we'll keep a big step ahead of identity thieves. It’s up to all of us to prevent identity theft.

Social Engineering - A Real Story in a Multi-national Company

Social Engineering Internet Security Whitepapers

"Hi! You must be Jan, pleasure to meet you! I just got off the phone with Jim in accounting who assured me you could direct me to the executive VP wing", "Pleasure to finally meet you! "I'm Rob Eldridge, the new Y2K Analyst." "I've been doing some Y2K Audits over in San Francisco in our branch office there. Looks like they finally broke down and sent me to Vegas!".

Social Engineering: Security Awareness Series

Social Engineering Internet Security Whitepapers

Understand the principles of social engineering. Define the goals of social engineering. Recognize the signs of social engineering. Identify ways to protect yourself from social engineering.

Social Engineering: Techniques that can bypass Intrusion Detection Systems

Social Engineering Internet Security Whitepapers

The purpose of this paper is to explain how Social Engineering can defeat Intrusion Detection (ID) Systems. As we now enter the 21st Century, the computer age and cyber warfare is in full swing. Companies and organizations are still not fully addressing or understanding the issue of Social Engineering. The concept of Social Engineering can cause destruction to networks and cost companies millions of dollars. This paper will try to bring to light exactly how Social Engineering exposes the vulnerabilities of Intrusion Detection Systems and what can be done to protect ourselves against these vulnerabilities.

The Phishing Guide: Understanding and Preventing Phishing Attacks

Social Engineering Internet Security Whitepapers Phishing

This paper covers the technologies and security flaws Phishers exploit to conduct their attacks, and provides detailed vendor-neutral advice on what organisations can do to prevent future attacks. Security professionals and customers can use this comprehensive analysis to arm themselves against the next phishing scam to reach their in-tray.