Dr. InfoSec™

Seeking to diagnose and treat everyday information security problems

QOTD on Social Engineering & Social Networks

Just because social engineering may sound passé doesn’t make it an antiquated attack.
Src: Social Engineering Fueled by Social Networks is a Potent Threat | Channel Insider
Posted by DrInfoSec on 6/04/2009

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Important Links

  • SMB Resources

Dr.InfoSec

Dr.InfoSec

Connect with me

  • LinkedIn
  • Twitter

About Me

The Dr. InfoSec™ Blog is curated by Christophe Veltsos, PhD, CISSP, CISA, CIPP.
Chris, aka Dr.InfoSec, is passionate about helping organizations take stock of their cyber risks and manage those risks across the intricate landscape of technology, business, and people.
Whether performing information security risk assessments, working alongside CIOs & CISOs to set and communicate strategic security priorities, or advising board members on effective governance of cyber risks, Chris enjoys working with business leaders to improve their organization's cyber risk posture.

Blog Archive

  • ►  2020 (1)
    • ►  February (1)
  • ►  2017 (21)
    • ►  November (1)
    • ►  September (8)
    • ►  August (2)
    • ►  July (6)
    • ►  May (1)
    • ►  March (1)
    • ►  January (2)
  • ►  2016 (1)
    • ►  May (1)
  • ►  2015 (2)
    • ►  October (1)
    • ►  March (1)
  • ►  2014 (20)
    • ►  November (5)
    • ►  October (2)
    • ►  August (4)
    • ►  June (1)
    • ►  May (2)
    • ►  April (3)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2013 (30)
    • ►  October (2)
    • ►  September (7)
    • ►  July (2)
    • ►  June (3)
    • ►  May (2)
    • ►  April (2)
    • ►  March (5)
    • ►  February (6)
    • ►  January (1)
  • ►  2012 (36)
    • ►  December (1)
    • ►  October (5)
    • ►  September (1)
    • ►  August (3)
    • ►  June (2)
    • ►  May (2)
    • ►  April (7)
    • ►  March (8)
    • ►  February (4)
    • ►  January (3)
  • ►  2011 (86)
    • ►  December (4)
    • ►  November (9)
    • ►  October (10)
    • ►  September (5)
    • ►  August (6)
    • ►  July (1)
    • ►  June (6)
    • ►  May (11)
    • ►  April (10)
    • ►  March (11)
    • ►  February (9)
    • ►  January (4)
  • ►  2010 (226)
    • ►  December (2)
    • ►  November (5)
    • ►  October (8)
    • ►  September (15)
    • ►  August (23)
    • ►  July (14)
    • ►  June (33)
    • ►  May (11)
    • ►  April (26)
    • ►  March (30)
    • ►  February (26)
    • ►  January (33)
  • ▼  2009 (341)
    • ►  December (17)
    • ►  November (25)
    • ►  October (20)
    • ►  September (15)
    • ►  August (28)
    • ►  July (33)
    • ▼  June (11)
      • QOTD - US Cyber Commander on Defending IT
      • QOTD Heartland CEO on PCI Compliance
      • Data security 'flouted by workers'
      • Incident Response Templates, Cheat Sheets, and more
      • RSA chief: The job of security guy is not to be 'D...
      • Corrupted Word Files for Sale - Educators Beware
      • 5 Free Ways to Track Online Leaks of Information
      • Cloud Computing: The Dawn of Maneuver Warfare in I...
      • RFC1918 Caching Security Issues
      • QOTD Standards and Bullet-Proof Vests
      • QOTD on Social Engineering & Social Networks
    • ►  May (7)
    • ►  April (33)
    • ►  March (61)
    • ►  February (35)
    • ►  January (56)
  • ►  2008 (102)
    • ►  December (45)
    • ►  November (42)
    • ►  October (9)
    • ►  September (4)
    • ►  February (2)

Labels

  • academia
  • breaches
  • certifications
  • CIO
  • CISO
  • cloud
  • complexity
  • conferences
  • cybercrime
  • cyberrisks
  • cyberwar
  • CyberWeek
  • directors
  • drinfosec
  • e-spy
  • education/training/awareness
  • email
  • executives/boards
  • financial_data
  • forensics
  • future
  • governance
  • government
  • health
  • humor
  • IBM
  • instruction
  • irp/drp/bcp
  • Israel
  • keynotes
  • legal
  • malware/exploits/vulns
  • management
  • medical
  • metrics_and_risk
  • misc
  • mobile
  • newsmedia
  • organizations
  • patches
  • people
  • podcast
  • presentation
  • press
  • privacy
  • process
  • professional_development
  • qotd
  • report
  • research
  • reviews
  • RSA
  • security_fail
  • security_hype
  • security_solutions
  • SecurityIntelligence
  • smarg_grid
  • social_engineering
  • social_networking
  • sponsored
  • standards/policies
  • terrorism
  • web2.0
  • wireless

Disclaimer

The views and opinions expressed here are those of Dr. Veltsos only and in no way represent the views, positions, or opinions of any previous, current, or future employers, clients, or associates.

All content on this blog is provided as general information and is for educational purposes only. It should not be construed as professional advice or guidance. All trademarks and copyrights on this blog belong to their respective owners.
Powered by Blogger.