impersonation

Government Agency Spoofing: DocuSign Attacks Exploit Government-Vendor Trust
Stephen Kowski | | CTO Corner, DocuSign, Email Protection, Fraud, government attack, impersonation, social engineering, spoofing
The latest wave of DocuSign attacks has taken a concerning turn, specifically targeting businesses that regularly interact with state, municipal, and licensing authorities. Since November 8 through November 14, we have observed ...

Socially Engineered Into Stealing $500,000 From a Casino
A cashier at a Colorado casino is accused of stealing half a million dollars in cash after allegedly being duped by phone calls and text messages from imposters posing as her bosses ...
Security Boulevard

Lessons from a Scam Artist
Social-Engineer | | General Social Engineer Blog, how do scammers use social engineering, impersonation, Lessons from a scam artist, Phishing, smishing, social engineering, techniques scammers use, vishing
What does a government scam, an IT support scam and a romance scam have in common? They all use psychology […] ...
A Device to Turn Traffic Lights Green
Here’s a story about a hacker who reprogrammed a device called “Flipper Zero” to mimic Opticom transmitters—to turn traffic lights in his path green. As mentioned earlier, the Flipper Zero has a ...
Defending against AI Lobbyists
When is it time to start worrying about artificial intelligence interfering in our democracy? Maybe when an AI writes a letter to The New York Times opposing the regulation of its own ...

Social Engineering and Healthcare
Social-Engineer | | Cybersecurity, Cybersecurity Training, impersonation, Infosec, Newsletter, Phishing, smishing, social engineering and healthcare, vishing
Social engineering has become a larger threat to the healthcare industry in recent years. So much so that the Federal […] ...

Three key variables you need to optimize for a successful phishing simulation program
Scott | | backlash, Creating Active Awareness, difficulty, Employee Awareness, frequency, Home, impersonation, Phishing, Phishing assessments, phishing exercises, phishing simulations, phishing tests, Security Awareness, Security Culture, tips
The post Three key variables you need to optimize for a successful phishing simulation program appeared first on Click Armor ...
Obligatory ChatGPT Post
Seems like absolutely everyone everywhere is playing with Chat GPT. So I did, too…. Write an essay in the style of Bruce Schneier on how ChatGPT will affect cybersecurity. As with any ...

Impersonation, Fraud and the Future of Deepfakes
All kinds of documents, communications, emails, text messages and other kinds of messages require authentication to be binding on the parties and to be admissible in court as evidence of the binding ...
Security Boulevard

Stronger Security Posture: Where to Start
Social-Engineer | | Cyber Security, General, impersonation, Phishing, Protect Yourself, smishing, social engineering, Stronger Security Posture:, vishing
We talk about information security and its importance all the time. The multitude of attacks in 2022 alone demonstrates its […] ...