article thumbnail

Real-life examples of social engineering ? part 2

IT Governance

Last month, I published an article looking at two examples of the use of social engineering in everyday life. Back in 2011, RSA employees received two phishing emails, which would ultimately lead to SecurID’s two-factor authentication system being compromised – costing RSA $66 million. Diamonds, diamonds, DIAMONDS. RSA SecurID breach.

Phishing 110
article thumbnail

Why is ‘Juice Jacking’ Suddenly Back in the News?

Krebs on Security

KrebsOnSecurity received a nice bump in traffic this week thanks to tweets from the Federal Bureau of Investigation (FBI) and the Federal Communications Commission (FCC) about “ juice jacking ,” a term first coined here in 2011 to describe a potential threat of data theft when one plugs their mobile device into a public charging kiosk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lucky MVP 13

Troy Hunt

Each year since 2011, Microsoft has sent me a lovely email around this time: I've been fortunate enough to find a passion in life that has allowed me to do what I love and make a great living out of it all whilst contributing to the community in a meaningful and impactful way.

article thumbnail

The Link Between AWM Proxy & the Glupteba Botnet

Krebs on Security

AWMproxy, the storefront for renting access to infected PCs, circa 2011. In 2011, researchers at Kaspersky Lab showed that virtually all of the hacked systems for rent at AWM Proxy had been compromised by TDSS (a.k.a An example of a cracked software download site distributing Glupteba. Image: Google.com.

Passwords 229
article thumbnail

Kevin Mitnick, Hacker Turned Cybersecurity Leader, Dies at 59

eSecurity Planet

Once dubbed “the world’s most wanted hacker” after his youthful exploits attacking Digital Equipment Corporation and Pacific Bell, Mitnick completed his decade-long transition to cybersecurity luminary when he joined KnowBe4 as Chief Hacking Officer and part owner in 2011.

article thumbnail

2011 Predictions: How Did I Do?

John Battelle's Searchblog

2011 was a strange year in many ways. Publishers have responded with their own adtech ( FM purchased Lijit , for example, Google bought AdMeld ), and on we go. Related: Predictions 2011. ( image ) For many years now I’ve made predictions, and for just as many years I review how I did. I think I got this right, in the main.

article thumbnail

Just Shipped 2011

Daradiction

2011 was a BIG year for me. I stepped up my public speaking profile this year, and this video < from the Esri partner conference is a great example. Saving the best for last, 2011 also got me into a very consistent meditation practice that gave me the energy and focus to generate these results. Public Speaking. Meditation.

IT 40