Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
CEHv8 Module 09 Social Engineering.pdf

CEHv8 Module 09 Social Engineering.pdf

Ratings: (0)|Views: 111 |Likes:
Published by Mehrdad Jingoism

More info:

Published by: Mehrdad Jingoism on Nov 17, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/17/2014

pdf

text

original

 
e * x
09
 
Exam 312-50 Certified Ethical HackerEthical Hacking and CountermeasuresSocial Engineering
Social Engineering
Module 09
Engineered by Hackers. Presented by Professionals.
«■*
CEH
Ethical Hacking Countermeasures v8
Module 09: Social Engineering Exam 312-50
Ethical Hacking and Countermeasures Copyright © by
EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.Module 09 Page 1293
 
Exam 312-50 Certified Ethical HackerEthical Hacking and CountermeasuresSocial Engineering
CEHSecurity News
Cybercriminals Use Social Engineering Emails to Penetrate Corporate Networks
September 25, 2012
FireEye, Inc. has announced the release of "Top Words Used in Spear Phishing Attacks to Successfully Compromise Enterprise Networks and Steal Data," a report that identifies the social engineering techniques cybercriminals use in email-based advanced cyber attacks. According to the report, the top words cybercriminals use create a sense of urgency to trick unsuspecting recipients into downloading malicious files. The top word category used to evade traditional IT security defenses in email-based attacks relates to express shipping.According to recent data from the FireEye "Advanced Threat Report," for the first six months of 2012, email-based attacks increased 56 percent. Email-based advanced cyber attacks easily bypass traditional signature-based security defenses, preying on naive users to install malicious files."Cybercriminals continue to evolve and refine their attack tactics to evade detection and use techniques that work. Spear phishing emails are on the rise because they work," said Ashar Aziz, Founder and CEO, FireEye. "Signature-based detection is ineffective against these constantly changing advanced attacks, so IT security departments need to add a layer of advanced threat protection to their security defences.""Top Words Used in Spear Phishing Attacks to Successfully Compromise Enterprise Networks and Steal Data," explains that express shipping terms are included in about one quarter of attacks, including "DHL", "UPS", and "delivery.11
 
Copyright © by EG-G(ancil. All Rights Reserved. Reproduction is Strictly Prohibited.
NewsProductServicesContactAbout
Security News
Cybercriminals Use Social Engineering Emails to
 
Penetrate Corporate Networks
Source: http://biztech2.in.comFireEye, Inc. has announced the release of "Top Words Used in Spear Phishing Attacks to
 
Successfully Compromise Enterprise Networks and Steal Data," a report that identifies the
 
social engineering techniques cybercriminals use in email-based advanced cyber-attacks.
 
According to the report, there are a number of words cybercriminals use to create a sense of 
 
urgency to trick unsuspecting recipients into downloading malicious files. The top word
 
category used to evade traditional IT security defenses in email-based attacks relates to
 
express shipping. According to recent data from the FireEye "Advanced Threat Report," for the
 
first six months of 2012, email-based attacks increased 56 percent. Email-based advanced
 
cyber-attacks easily bypass traditional signature-based security defenses, preying on naive
 
users to install malicious files."Cybercriminals continue to evolve and refine their attack tactics to evade detection and use
 
techniques that work. Spear phishing emails are on the rise because they work," said Ashar
 
Aziz, Founder and CEO, FireEye. "Signature-based detection is ineffective against these
Ethical Hacking and Countermeasures Copyright © by
EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.Module 09 Page 1294

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->