Threat Level: green Handler on Duty: Rob VandenBrink

SANS ISC Diaries by Keyword


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
DateAuthorTitle

SOCIAL NETWORKING RISKS

2011-05-25Lenny ZeltserMonitoring Social Media for Security References to Your Organization
2010-06-10Deborah HaleTop 5 Social Networking Media Risks

SOCIAL

2014-08-20/a>Kevin ShorttSocial Engineering Alive and Well
2014-01-24/a>Chris MohanPhishing via Social Media
2013-07-13/a>Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2013-07-08/a>Richard PorterWhy do we Click?
2013-02-25/a>Johannes UllrichMass-Customized Malware Lures: Don't trust your cat!
2012-04-06/a>Johannes UllrichSocial Share Privacy
2011-05-25/a>Lenny ZeltserMonitoring Social Media for Security References to Your Organization
2011-05-10/a>Swa FrantzenChanging MO in scamming our users ?
2010-12-29/a>Daniel WesemannBeware of strange web sites bearing gifts ...
2010-11-22/a>Lenny ZeltserBrand Impersonations On-Line: Brandjacking and Social Networks
2010-09-16/a>Johannes UllrichFacebook "Like Pages"
2010-07-07/a>Kevin ShorttFacebook, Facebook, What Do YOU See?
2010-06-14/a>Manuel Humberto Santander PelaezNew way of social engineering on IRC
2010-06-10/a>Deborah HaleTop 5 Social Networking Media Risks
2010-05-02/a>Mari NicholsZbot Social Engineering
2010-04-29/a>Bojan ZdrnjaWho needs exploits when you have social engineering?
2010-04-13/a>Johannes UllrichMore Legal Threat Malware E-Mail
2009-06-01/a>G. N. WhiteYet another "Digital Certificate" malware campaign
2009-04-24/a>Pedro BuenoDid you check your conference goodies?
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering

NETWORKING

2014-01-24/a>Chris MohanPhishing via Social Media
2013-07-13/a>Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2012-04-06/a>Johannes UllrichSocial Share Privacy
2011-05-25/a>Lenny ZeltserMonitoring Social Media for Security References to Your Organization
2010-11-22/a>Lenny ZeltserBrand Impersonations On-Line: Brandjacking and Social Networks
2010-09-16/a>Johannes UllrichFacebook "Like Pages"
2010-07-07/a>Kevin ShorttFacebook, Facebook, What Do YOU See?
2010-06-10/a>Deborah HaleTop 5 Social Networking Media Risks
2009-08-13/a>Jim ClausingNew and updated cheat sheets

RISKS

2013-08-19/a>Guy Bruneau Business Risks and Cyber Attacks
2011-05-25/a>Lenny ZeltserMonitoring Social Media for Security References to Your Organization
2010-06-10/a>Deborah HaleTop 5 Social Networking Media Risks