G DATA Ratgeber – Was ist eigentlich Social Engineering?

G DATA Ratgeber – Was ist eigentlich Social Engineering?

Sie ist hübsch, Single und ihre Nachrichten sind so aufregend wie ihre blonde Mähne. Und ehe sich der Empfänger ihrer Freundschaftsanfrage auf Facebook versieht, schreiben sie sich ununterbrochen kurze, verführerische Nachrichten. An manchen Tagen auch lange, sehr intime E-Mails. Es ist echt verrückt, wie viel er und seine zufällige Online-Bekanntschaft gemeinsam haben. Er fühlt sich geborgen und zum ersten Mal seit Jahren aufrichtig verstanden. Und das, obwohl sie sich noch nie persönlich begegnet sind. Manche Menschen führt das Schicksal zusammen – und andere fallen auf einen Betrüger herein. Das ist Social Engineering.

SecLab_Ratgeber_Social-Engineering-FakeID_66124Unser Technologie-Partner G DATA zeigt in diesem Artikel, wie Social Engineering entstanden ist und wie es heute im Internet funktioniert.

Weiterhin gibt es dort Tipps, wie Sie sich vor Social Engineering schützen können, denn betroffen sind nicht nur Privatpersonen. Auch Unternehmen werden auf diese Art angegriffen, um Informationen oder Zugang zu erhalten.

Wie Sie es Angreifern mit Sicherheits-Technologie ein Stück schwieriger machen können, erläutern Ihnen gerne unsere Kollegen:

DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net
Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net

Building a Secure Architecture with Cisco SAFE

By Christian Janoff The biggest challenge in securing companies today is complexity. Too many attacks, but also, too many defenses. And, they keep growing. Maddening. But, there is a new security reference that simplifies this Herculean task. Cisco SAFE uses a model and a method to guide you. SAFE uses a model to organize the network into logical […]

Source:: Cisco Security Notice

Building a Secure Architecture with Cisco SAFE

By Christian Janoff The biggest challenge in securing companies today is complexity. Too many attacks, but also, too many defenses. And, they keep growing. Maddening. But, there is a new security reference that simplifies this Herculean task. Cisco SAFE uses a model and a method to guide you. SAFE uses a model to organize the network into logical […]

Source:: Cisco Security Notice

Cisco TrustSec, the “Swiss Army Knife” in your network security toolbox

By Kevin Regan A new approach to segmentation that simply delivers more Network segmentation has been around for quite a while as a way to isolate environments and critical systems to secure data and IT assets. Recent breaches have highlighted the value of segmentation in reducing the attack surface and preventing the lateral movement of targeted malware. But […]

Source:: Cisco Security Notice

Cisco TrustSec, the “Swiss Army Knife” in your network security toolbox

By Kevin Regan A new approach to segmentation that simply delivers more Network segmentation has been around for quite a while as a way to isolate environments and critical systems to secure data and IT assets. Recent breaches have highlighted the value of segmentation in reducing the attack surface and preventing the lateral movement of targeted malware. But […]

Source:: Cisco Security Notice

Detecting DNS Data Exfiltration

By Talos Group The recent discovery of Wekby and Point of Sale malware using DNS requests as a command and control channel highlights the need to consider DNS as a potentially malicious channel. Although a skilled analyst may be able to quickly spot unusual activity because they are familiar with their organisation’s normal DNS activity, manually reviewing DNS […]

Source:: Cisco Security Notice

Detecting DNS Data Exfiltration

By Talos Group The recent discovery of Wekby and Point of Sale malware using DNS requests as a command and control channel highlights the need to consider DNS as a potentially malicious channel. Although a skilled analyst may be able to quickly spot unusual activity because they are familiar with their organisation’s normal DNS activity, manually reviewing DNS […]

Source:: Cisco Security Notice

Vulnerability Spotlight: LibreOffice RTF Vulnerability

By Talos Group Vulnerability discovered by Aleksandar Nikolic of Cisco Talos. Talos is disclosing the presence of CVE-2016-4324 / TALOS-CAN-0126, a Use After Free vulnerability within the RTF parser of LibreOffice. The vulnerability lies in the parsing of documents containing both stylesheet and superscript tokens. A specially crafted RTF document containing both a stylesheet and superscript element causes […]

Source:: Cisco Security Notice

Vulnerability Spotlight: LibreOffice RTF Vulnerability

By Talos Group Vulnerability discovered by Aleksandar Nikolic of Cisco Talos. Talos is disclosing the presence of CVE-2016-4324 / TALOS-CAN-0126, a Use After Free vulnerability within the RTF parser of LibreOffice. The vulnerability lies in the parsing of documents containing both stylesheet and superscript tokens. A specially crafted RTF document containing both a stylesheet and superscript element causes […]

Source:: Cisco Security Notice

Better Security Through Openness and Multi-Vendor Integration

By Scott Pope Cisco Further Expands Technology Partner Ecosystem – New Partners and New Tech Integration Areas Security is an interconnected system, not a bunch of disparate boxes. Like a school of fish, security should operate collaboratively to accomplish a goal. Not just for the sake of “integration”, but because the very nature of securing networks, applications and […]

Source:: Cisco Security Notice