Quantcast
Channel: social engineering – KeriBlog
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The ‘USB to Ego’ Attack

A brief backstory first, to set up the attack. I arrived at the end of Honda’s FCEV launch, extra unfortunately, because there was water involved, a simulated rainstorm, rare. Like the guy mopping up...

View Article


Image may be NSFW.
Clik here to view.

Tiiiiis the Season for Natural Disguises

Fa-la-la-la-laaa lala get some. It’s a Christmas wreath, obscuring the licence plate. Jokes aside, scammers love this time of year.  People’s hearts are more giving and trusting than usual, because tis...

View Article


Image may be NSFW.
Clik here to view.

LinkedIn Invites are Great for Spreading Malware

Fake LinkedIn invitations are one of the most effective methods of getting a human to click a malicious link. This type of attack, a phishing attack (or a more targeted, spear phishing attack) works...

View Article

Image may be NSFW.
Clik here to view.

Flower Delivery

“Flower”. “Delivery”.     The post Flower Delivery appeared first on KeriBlog.

View Article

Image may be NSFW.
Clik here to view.

Should’ve Been a Pentester

    The post Should’ve Been a Pentester appeared first on KeriBlog.

View Article


Image may be NSFW.
Clik here to view.

Never Call when This Happens

Kind’ve clever eh: a real-sounding URL, “Support for Apple”, and a toll-free number, how nice for someone else to foot the bill. The Attack Pop-up window appears > you call the number > whomever...

View Article

Image may be NSFW.
Clik here to view.

Analzying a Vishing Attack

There’s a CRA (Canada Revenue Agency) scam going around right now.  I received a call from “Roger” at the CRA this week, asking me verify my current address. Let’s analyze at the attack. The Attack...

View Article

Image may be NSFW.
Clik here to view.

Don’t Get “Vished”– Attacked via the Phone

Basically – the phone is used as an attack vector to get information. Vishing – attacker calls you and extracts sensitive information you’d otherwise not share This type of psychological attack takes...

View Article


Image may be NSFW.
Clik here to view.

Watch Out for On-site Impersonation Attacks

When a stranger shows up to your place of business, don’t take it at face value they are who they claim to be. The Attack By exploiting people’s trust, manners, and our social nature to be helpful,...

View Article


Image may be NSFW.
Clik here to view.

A Multi-Staged Attack Works Well

A Multi-Staged Attack – usually a phishing email, followed up by a phone call. It works because like Michele says… … “if it comes from more than one source, it must be true.” The Attack A call will...

View Article
Browsing all 10 articles
Browse latest View live