@Nicole as having spent years a philopshy student, my only response to such quandaries is whereever you find yourself that's where you are. And if you're in the matrix or a brain in a vat well... ehh who cares
I read one account where they created a completely fictious security professional (who happened to be a hot blonde) and within 2 weeks she had over 200 connections to high profile security professionals, including the offering of sending of gifts and dinner invitations
Two things really struck me this week. First, that so many people include PRECISELY the info needed for SSN grabbing and social engineering on their FB info pages. City, date of birth, location, etc....
I think LinkedIn is underconsidered when it comes to risk. It's seen as the "professional" site, but has all sorts of infromation about your position within an org and people are more willing to accept people they don't know for the sake of networking
The security expert who spoke about Whaling at Interop yesterday said we should all go to 123People.com and type in our names and see what info is there on us because that's the first place whalers will go to learn about us.
The appeal of whaling is that you're targeting an employee who is likely to have multiple network permissions. Successfully hooking Fred in the mailroom, who doesn't have access to anything interesting is pointless.
@Mary, I am sure if you use Bing and enter "American Airlines" you'll get a bunch of sites pretending to be AA. Most of these are just trying to sell you something, but there could be a bad actor in there. We've also discussed recently how current news lends itself to this...
Wikipedia is consistent with my understanding: " a clickjacking takes the form of embedded code or script that can execute without the user's knowledge, such as clicking on a button that appears to perform another function."
You go to click on a familiar link on a page - eg "Like" on Facebook - and someone has placed another button on top of it. But a transparent one, or a duplicate, so it looks like a regular "Like" button. You click, and it takes you somewhere else, and nasty stuff starts executing.
You've heard the expression, "Out of the frying pan, into the fire?" Amazon lives in the fire. The e-tailer wins by keeping things hot for its competitors, employees, and itself, according to a new book.
Positec, a manufacturer of power tools for homes and commercial applications, achieves greater customer service flexibility and cuts hold times in half by using a cloud-based service to manage its call center.
Big-data and analytics tools enable marketers to understand customers as individuals, identifying unmet needs and addressing each customer as a "segment of one," says John Kennedy, VP corporate marketing, IBM.
Expert Integrated Systems: Changing the Experience & Economics of IT In this e-book, we take an in-depth look at these expert integrated systems -- what they are, how they work, and how they have the potential to help CIOs achieve dramatic savings while restoring IT's role as business innovator. READ THIS eBOOK
your weekly update of news, analysis, and
opinion from Internet Evolution - FREE! REGISTER HERE
Wanted! Site Moderators Internet Evolution is looking for a handful of readers to help moderate the message boards on our site as well as engaging in high-IQ conversation with the industry mavens on our thinkerNet blogosphere. The job comes with various perks, bags of kudos, and GIANT bragging rights. Interested?