Showing 2 results for: July 2013 ×SpiderLabs ×

Ebook: Inside A Hacker's Playbook -- 10 Targeted Techniques That Will Break Your Security

As criminal hackers come up with more and more ingenious ways to take over Internet users' devices, break into corporate networks and steal sensitive information, keeping track of their methods becomes harder every day. How do they do research about their victims? What tactics do they use to home in on their targets to steal specific information? How do they keep themselves under the IT security radar?

Media Outlet Gets Hacked (On Purpose)

It only took an embroidered hat and polo shirt for Trustwave’s Senior Security Consultant Philip Pieterse to gain access to a media outlet’s offices, systems and private data. Posing as a telecommunications engineer, Pieterse walked into an office full of people, sat down at the Managing Director’s desk and downloaded a sensitive file. The Managing Director’s colleagues noticed Pieterse but didn’t say anything because they didn’t want to cause a stir.