article thumbnail

Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam

Security Boulevard

Postal Service, in phishing campaign targeting mobile device users in hope that victims will divulge credentials and personal information, Zimperium researchers say. The post Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam appeared first on Security Boulevard.

Mobile 116
article thumbnail

Disability Access Within the Field of Social Engineering

Security Through Education

I’ve seen people with disabilities in online discussions and on the Social Engineer Slack channel exploring suitable career paths. The Value of Diversity in Social Engineering Social engineering is, at its core, the art of human connection.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mobile Device Security Policy

Tech Republic Security

Mobile devices are commonly used to conduct company business, which can render them more susceptible to risk than desktop or even laptop computers. In addition, the same social engineering, phishing and application/operating system vulnerabilities which plague desktops.

Mobile 168
article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The hackers rely heavily on social engineering tactics to distribute the malware.

article thumbnail

Happy 15th Anniversary, KrebsOnSecurity!

Krebs on Security

Much of my summer was spent reporting a story about how advertising and marketing firms have created a global free-for-all where anyone can track the daily movements and associations of hundreds of millions of mobile devices , thanks to the ubiquity of mobile location data that is broadly and cheaply available.

Scams 223
article thumbnail

Experts warn of the new sophisticate Crocodilus mobile banking Trojan

Security Affairs

Notifications & Social Engineering: Posts fake push notifications to trick users. “The emergence of the Crocodilus mobile banking Trojan marks a significant escalation in the sophistication and threat level posed by modern malware. ” ThreatFabric concludes.

Banking 67
article thumbnail

Social Engineering 101: What It Is & How to Safeguard Your Organization

Duo's Security Blog

But as it turns out, John was a victim of a phishing scam, a type of social engineering attack where the cybercriminal impersonated John’s IT department to gain his trust and trick him into revealing his login credentials. What is social engineering? This is available in Duo’s Advantage and Premier tiers.