29:
357:, reported that the HP board hired a private investigation company to delve into who was responsible for leaks within the board. Dunn acknowledged that the company used the practice of pretexting to solicit the telephone records of board members and journalists. Chairman Dunn later apologized for this act and offered to step down from the board if it was desired by board members. Unlike Federal law, California law specifically forbids such pretexting. The four felony charges brought on Dunn were dismissed.
370:
1904:
287:, many other types of private records are being bought and sold in the public market. Alongside many advertisements for cell phone records, wireline records and the records associated with calling cards are advertised. As individuals shift to VoIP telephones, it is safe to assume that those records will be offered for sale as well. Currently, it is legal to sell telephone records, but illegal to obtain them.
275:
states, in part: "Whenever the
Commission shall have reason to believe that any such person, partnership, or corporation has been or is using any unfair method of competition or unfair or deceptive act or practice in or affecting commerce, and if it shall appear to the Commission that a proceeding by
213:
One study published in 2016 had researchers drop 297 USB drives around the campus of the
University of Illinois. The drives contained files on them that linked to webpages owned by the researchers. The researchers were able to see how many of the drives had files on them opened, but not how many were
90:
One example of social engineering is an individual who walks into a building and posts an official-looking announcement to the company bulletin that says the number for the help desk has changed. So, when employees call for help the individual asks them for their passwords and IDs thereby gaining the
533:
is an
American social engineer and information technology security consultant. He is best known as an author of 4 books on social engineering and cyber security and founder of Innocent Lives Foundation, an organization that helps tracking and identifying child trafficking by seeking the assistance
314:
became the first state to sue an online records broker when
Attorney General Lisa Madigan sued 1st Source Information Specialists, Inc. A spokeswoman for Madigan's office said. The Florida-based company operates several Web sites that sell mobile telephone records, according to a copy of the suit.
279:
The statute states that when someone obtains any personal, non-public information from a financial institution or the consumer, their action is subject to the statute. It relates to the consumer's relationship with the financial institution. For example, a pretexter using false pretenses either to
154:
they regularly visit. The victim feels safe to do things they would not do in a different situation. A wary person might, for example, purposefully avoid clicking a link in an unsolicited email, but the same person would not hesitate to follow a link on a website they often visit. So, the attacker
59:
for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in the sense that it is often one of the many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their
417:
numbers, birthdates, etc.), warnings were sent out regarding the dangers of impending security risks. In the day after the establishment of a legitimate help website (equifaxsecurity2017.com) dedicated to people potentially victimized by the breach, 194 malicious domains were reserved from small
266:
law that specifically addresses pretexting of banking records as an illegal act punishable under federal statutes. When a business entity such as a private investigator, SIU insurance investigator, or an adjuster conducts any type of deception, it falls under the authority of the
490:. He became well known for live demonstrations as well as playing recorded calls after talks where he explained his thought process on what he was doing to get passwords through the phone. As a child, Ridpath was connected with Badir Brothers and was widely known within the
1716:
63:
Research done in 2020 has indicated that social engineering will be one of the most prominent challenges of the upcoming decade. Having proficiency in social engineering will be increasingly important for organizations and countries, due to the impact on
303:, Michigan), chairman of the Energy and Commerce Subcommittee on Telecommunications and the Internet, expressed concern over the easy access to personal mobile phone records on the Internet during a House Energy & Commerce Committee hearing on "
280:
get a consumer's address from the consumer's bank, or to get a consumer to disclose the name of their bank, would be covered. The determining principle is that pretexting only occurs when information is obtained through false pretenses.
322:
Several wireless providers, including T-Mobile, Verizon, and
Cingular filed earlier lawsuits against records brokers, with Cingular winning an injunction against First Data Solutions and 1st Source Information Specialists. U.S. Senator
442:, had entered their passwords thinking it would be reset, causing their personal information, and thousands of private emails and documents to be leaked. With this information, they hacked into other computers in the
210:, among other media. Curious people take it and plug it into a computer, infecting the host and any attached networks. Again, hackers may give them enticing labels, such as "Employee Salaries" or "Confidential".
271:(FTC). This federal agency has the obligation and authority to ensure that consumers are not subjected to any unfair or deceptive business practices. US Federal Trade Commission Act, Section 5 of the
95:
and starts a conversation with the target. Gradually the hacker gains the trust of the target and then uses that trust to get access to sensitive information like password or bank account details.
1385:
1695:
N.J. Evans. (2009). "Information
Technology Social Engineering: An Academic Definition and Study of Social Engineering-Analyzing the Human Firewall." Graduate Theses and Dissertations. 10709.
1059:
319:
quickly followed
Madigan's lead, filing suits respectively, against 1st Source Information Specialists and, in Missouri's case, one other records broker – First Data Solutions, Inc.
124:) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances. An elaborate
276:
it in respect thereof would be to the interest of the public, it shall issue and serve upon such person, partnership, or corporation a complaint stating its charges in that respect."
1037:
1509:
190:
Unless computer controls block infections, insertion compromises PCs "auto-running" media. Hostile devices can also be used. For instance, a "lucky winner" is sent a free
1125:"Office of Public Affairs | Grand Jury Indicts 12 Russian Intelligence Officers for Hacking Offenses Related to the 2016 Election | United States Department of Justice"
1456:
1639:
283:
While the sale of cell telephone records has gained significant media attention, and telecommunications records are the focus of the two bills currently before the
71:
Social engineering attacks have been increasing in intensity and number, cementing the need for novel detection techniques and cyber security educational programs.
187:
in locations people will find them (bathrooms, elevators, sidewalks, parking lots, etc.), give them legitimate and curiosity-piquing labels, and wait for victims.
474:, but later framed them for erasing the system files at US Leasing after a falling out, leading to Mitnick's first conviction. She retired to professional poker.
214:
inserted into a computer without having a file opened. Of the 297 drives that were dropped, 290 (98%) of them were picked up and 135 (45%) of them "called home".
155:
prepares a trap for the unwary prey at a favored watering hole. This strategy has been successfully used to gain access to some (supposedly) very secure systems.
1124:
68:
as well. Social engineering raises the question of whether our decisions will be accurately informed if our primary information is engineered and biased.
1727:
831:
327:(D-New York) introduced legislation in February 2006 aimed at curbing the practice. The Consumer Telephone Records Protection Act of 2006 would create
1546:
1482:
1063:
1798:
1770:
91:
ability to access the company's private information. Another example of social engineering would be that the hacker contacts the target on a
514:
Brothers Ramy, Muzher, and Shadde Badir—all of whom were blind from birth—managed to set up an extensive phone and computer fraud scheme in
996:
443:
1212:
Proceedings of the 4th
Workshop on Ict Uses in Warfare and the Safeguarding of Peace 2012 (Iwsp 2012) and Journal of Information Warfare
889:
857:
748:
2342:
810:"Chinese Espionage Campaign Compromises Forbes.com to Target US Defense, Financial Services Companies in Watering Hole Style Attack"
246:
with fines of up to $ 250,000 and ten years in prison for individuals (or fines of up to $ 500,000 for companies). It was signed by
609:"Cybersecurity, social engineering, artificial intelligence, technological addictions: Societal challenges for the coming decade"
263:
2376:
22:
534:
of information security specialists, using data from open-source intelligence (OSINT) and collaborating with law enforcement.
2319:
1760:
1746:
1630:
1095:
565:
1701:
Z. Wang, L. Sun and H. Zhu. (2020) "Defining Social
Engineering in Cybersecurity," in IEEE Access, vol. 8, pp. 85094-85115,
582:
2350:
980:
Mitnick, K (2002): "The Art of
Deception", p. 103 Wiley Publishing Ltd: Indianapolis, Indiana; United States of America.
1015:
1791:
912:
2282:
1690:
1676:
1668:
1622:
1577:
1336:
1255:
1183:
985:
381:
2078:
705:
Hatfield, Joseph M (June 2019). "Virtuous human hacking: The ethics of social engineering in penetration-testing".
809:
2332:
1602:
1077:
1784:
929:
1731:
835:
427:
339:
272:
2337:
2258:
2058:
1256:"BsidesPDX Track 1 10/07/11 02:52PM, BsidesPDX Track 1 10/07/11 02:52PM BsidesPDX on USTREAM. Conference"
519:
128:, it most often involves some prior research or setup and the use of this information for impersonation (
2314:
2272:
1928:
503:
495:
48:
608:
2175:
1893:
1533:
1584:
1417:
2160:
2038:
1933:
1303:
797:
431:
406:
268:
150:
Water holing is a targeted social engineering strategy that capitalizes on the trust users have in
84:
1151:
1038:"Credit reporting firm Equifax says data breach could potentially affect 143 million US consumers"
16:
Psychological manipulation of people into performing actions or divulging confidential information
2248:
2200:
1863:
1702:
446:, implanting malware in them, which caused their computer activities to be monitored and leaked.
410:
1431:
963:
438:'s campaign, disguised as a Google alert. Many members, including the chairman of the campaign,
530:
259:
239:
133:
92:
28:
1593:
793:
2289:
2023:
1404:
206:
with malicious software left in opportunistic or conspicuous places. It may be a CD, DVD, or
1359:
864:
772:
2309:
2221:
2170:
2115:
1983:
1956:
1938:
1836:
1807:
740:
284:
191:
145:
40:
1903:
968:
109th Congress (2005–2006) H.R.4709 – Telephone Records and Privacy Protection Act of 2006
8:
2381:
2093:
1868:
1826:
903:
Conklin, Wm. Arthur; White, Greg; Cothren, Chuck; Davis, Roger; Williams, Dwayne (2015).
300:
486:. He is well known for developing techniques and tactics for social engineering through
482:
Mike Ridpath is a security consultant, published author, speaker and previous member of
2386:
2277:
2205:
2110:
1756:
722:
636:
168:
242:
approved a Senate sponsored bill making the pretexting of telephone records a federal
2325:
2083:
2018:
1968:
1915:
1873:
1821:
1686:
1672:
1664:
1626:
1618:
1573:
1332:
1179:
981:
908:
883:
640:
628:
561:
167:
that uses physical media and relies on the curiosity or greed of the victim. In this
726:
2294:
2234:
1998:
1988:
1883:
714:
620:
551:
350:
56:
1457:"Bens Book of the Month Review of Social Engineering The Science of Human Hacking"
2185:
2165:
2063:
1888:
1878:
1572:
Boyington, Gregory. (1990). 'Baa Baa Black Sheep' Published by Gregory Boyington
1328:
1173:
660:
School of Electrical Engineering and Computer Science, University of North Dakota
555:
435:
414:
354:
324:
207:
203:
184:
80:
52:
2355:
2253:
2103:
2053:
2028:
1993:
1973:
1853:
1841:
718:
247:
1510:"Phishing Dark Waters: The Offensive and Defensive Sides of Malicious E-mails"
1281:
1233:
624:
2370:
2265:
2226:
2195:
2190:
2043:
2033:
2003:
1656:
1652:
1635:
1615:
Hacking the Human: Social Engineering Techniques and Security Countermeasures
632:
467:
459:
21:
For the influencing of attitudes and social behaviors on a large scale, see
2299:
2155:
1858:
1607:
687:
487:
439:
418:
variations on the URL, capitalizing on the likelihood of people mistyping.
331:
164:
1259:
676:
Jaco, K: "CSEPS Course Workbook" (2004), unit 3, Jaco Security Publishing.
2239:
2073:
2048:
2013:
1848:
655:
471:
176:
65:
905:
Principles of Computer Security, Fourth Edition (Official Comptia Guide)
557:
Security engineering: a guide to building dependable distributed systems
369:
2304:
2120:
2068:
1951:
1831:
1776:
1696:
296:
223:
136:, last bill amount) to establish legitimacy in the mind of the target.
104:
2180:
2135:
2130:
1978:
1946:
491:
463:
1208:"Mobile Devices and the Military: useful Tool or Significant Threat"
2140:
2098:
1961:
1207:
769:
The story of HP pretexting scandal with discussion is available at
335:
316:
311:
79:
All social engineering techniques are based on attributes of human
502:, such as, Phrack, B4B0 and 9x on modifying Oki 900s, blueboxing,
2150:
2125:
2088:
409:
in which over 150 million private records were leaked (including
227:
172:
151:
121:
1585:
Re-Floating the Titanic: Dealing with Social Engineering Attacks
688:"HOSTILE INFLUENCE AND EMERGING COGNITIVE THREATS IN CYBERSPACE"
518:
in the 1990s using social engineering, voice impersonation, and
334:
penalties for stealing and selling the records of mobile phone,
2008:
1923:
1661:
The Art of Deception: Controlling the Human Element of Security
1483:"Book Review: Social Engineering: The Science of Human Hacking"
824:
802:
515:
499:
483:
328:
243:
199:
180:
1644:
1594:
Development of methodical social engineering taxonomy project
120:, is the act of creating and using an invented scenario (the
32:
1060:"Straight Talk: Beware scams related to Equifax data breach"
1747:
Should Social Engineering be a part of Penetration Testing?
1001:
1508:
Hadnagy, Christopher; Fincher, Michele (22 January 2020).
125:
902:
1547:"Hacker creates organization to unmask child predators"
1538:
360:
1764:
US Committee on Commerce, Science, and Transportation
907:. New York: McGraw-Hill Education. pp. 193–194.
560:(2 ed.). Indianapolis, IN: Wiley. p. 1040.
421:
290:
202:, suggesting the device's undesirable nature) is any
498:
community for his articles with popular underground
1603:Office workers give away passwords for a cheap pen
233:
2368:
1771:Memo to the Press: Pretexting is Already Illegal
1730:. Light Reading Inc. 7 June 2006. Archived from
999:Stephen Shankland, 8 September 2006 1:08 PM PDT
834:. Light Reading Inc. 7 June 2006. Archived from
1096:"2016 Presidential Campaign Hacking Fast Facts"
692:Centre for Economics and Foreign Policy Studies
400:
194:compromising any computer it is plugged to. A "
51:of people into performing actions or divulging
1507:
1432:"43 Best Social Engineering Books of All Time"
1178:. Scorpio Net Security Services. 16 May 2013.
794:Pretexting: Your Personal Information Revealed
308:Why Aren't Phone Records Safe From Pretexting?
1792:
1534:"WTVR:"Protect Your Kids from Online Threats"
1424:
997:HP chairman: Use of pretexting 'embarrassing'
1683:Social Engineering: The Art of Human Hacking
1258:. Ustream.tv. 7 October 2011. Archived from
1234:"Social Engineering: Manipulating the human"
434:sent phishing emails directed to members of
1597:Master's Thesis, Naval Postgraduate School.
449:
444:Democratic Congressional Campaign Committee
1799:
1785:
1386:"Social Engineering A Young Hacker's Tale"
1175:Social Engineering: Manipulating the human
2343:Security information and event management
1016:"Calif. court drops charges against Dunn"
653:
525:
1806:
930:"#BHUSA Dropped USB Experiment Detailed"
704:
685:
550:
27:
1475:
1304:"Social Engineering a General Approach"
927:
773:"HP Pretexting Scandal by Faraz Davani"
606:
74:
2369:
1544:
1149:
888:: CS1 maint: archived copy as title (
770:
656:"Social Engineering Attacks: A Survey"
253:
23:social engineering (political science)
2320:Host-based intrusion detection system
1780:
1761:Electronic Privacy Information Center
1757:"Protecting Consumers' Phone Records"
1501:
1119:
1117:
315:The attorneys general of Florida and
1697:https://lib.dr.iastate.edu/etd/10709
607:Guitton, Matthieu J. (1 June 2020).
364:
361:Notable social engineering incidents
2351:Runtime application self-protection
1617:Published by Gower Publishing Ltd.
1449:
1205:
990:
733:
432:Russian Military Intelligence (GRU)
13:
1902:
1565:
1360:"Wired 12.02: Three Blind Phreaks"
1114:
422:2016 United States Elections Leaks
345:
291:1st Source Information Specialists
14:
2398:
2283:Security-focused operating system
1728:"Social Engineering, the USB Way"
1710:
1545:Larson, Selena (14 August 2017).
832:"Social Engineering, the USB Way"
509:
198:" (the colloquial term for horse
2079:Insecure direct object reference
812:. invincea.com. 10 February 2015
771:Davani, Faraz (14 August 2011).
751:from the original on 7 July 2024
741:"Fundamentals of cyber security"
454:
368:
2333:Information security management
1717:Social Engineering Fundamentals
1703:doi:10.1109/ACCESS.2020.2992807
1527:
1378:
1352:
1321:
1309:. Informatica Economica journal
1296:
1284:. BrightTALK. 29 September 2011
1274:
1248:
1226:
1199:
1166:
1143:
1088:
1070:
1052:
1030:
1008:
974:
956:
953:Restatement 2d of Torts § 652C.
947:
921:
896:
850:
786:
477:
234:Pretexting of telephone records
226:, pretexting is an invasion of
163:Baiting is like the real-world
139:
1649:. Mitnick Security Publishing.
1282:"Automated Social Engineering"
928:Raywood, Dan (4 August 2016).
763:
698:
679:
670:
647:
600:
575:
544:
1:
2377:Social engineering (security)
1773:. Retrieved 9 September 2006.
1681:Hadnagy, Christopher, (2011)
1600:Leyden, John. 18 April 2003.
1150:Hafner, Katie (August 1995).
964:"Congress outlaws pretexting"
537:
98:
1766:. Retrieved 8 February 2006.
583:"Social Engineering Defined"
428:2016 United States Elections
401:Equifax breach help websites
340:Voice over Internet Protocol
7:
2338:Information risk management
2259:Multi-factor authentication
1815:Related security categories
613:Computers in Human Behavior
116:), also known in the UK as
10:
2403:
2315:Intrusion detection system
2273:Computer security software
1929:Advanced persistent threat
1753:. Retrieved 3 August 2009.
1723:. Retrieved 3 August 2009.
1487:The Ethical Hacker Network
1152:"Kevin Mitnick, unplugged"
1082:Security Through Education
719:10.1016/j.cose.2019.02.012
654:Salahdine, Fatima (2019).
587:Security Through Education
430:, hackers associated with
158:
143:
102:
49:psychological manipulation
20:
2214:
1914:
1900:
1894:Digital rights management
1814:
1591:Laribee, Lena. June 2006
1331:. Hays. 7 November 2018.
1236:. YouTube. 7 October 2011
625:10.1016/j.chb.2020.106307
520:Braille-display computers
2039:Denial-of-service attack
1934:Arbitrary code execution
1040:. CNBC. 7 September 2018
798:Federal Trade Commission
707:Computers & Security
686:Kirdemir, Baris (2019).
450:Notable social engineers
407:2017 Equifax data breach
269:Federal Trade Commission
248:President George W. Bush
53:confidential information
2249:Computer access control
2201:Rogue security software
1864:Electromagnetic warfare
1610:. Retrieved 2004-09-09.
411:Social Security numbers
353:, former chairwoman of
305:Phone Records For Sale:
230:tort of appropriation.
2295:Obfuscation (software)
2024:Browser Helper Objects
1908:
1412:Cite journal requires
531:Christopher J. Hadnagy
526:Christopher J. Hadnagy
470:and Lewis de Payne in
260:Gramm-Leach-Bliley Act
240:United States Congress
217:
134:Social Security number
93:social networking site
36:
2290:Data-centric security
2171:Remote access trojans
1906:
1655:, Simon, William L.,
1640:KasperaviÄŤius, Alexis
1018:. CNET. 14 March 2007
31:
2222:Application security
2116:Privilege escalation
1984:Cross-site scripting
1837:Cybersex trafficking
1808:Information security
1685:Published by Wiley.
1663:Published by Wiley.
1582:Harley, David. 1998
1206:Niekerk, Brett van.
342:(VoIP) subscribers.
285:United States Senate
250:on 12 January 2007.
192:digital audio player
146:Watering hole attack
75:Techniques and terms
41:information security
1869:Information warfare
1827:Automotive security
1613:Mann, Ian. (2008).
1066:on 6 December 2020.
782:– via Scribd.
462:became involved in
254:Federal legislation
2278:Antivirus software
2146:Social engineering
2111:Polymorphic engine
2064:Fraudulent dialers
1969:Hardware backdoors
1909:
1391:. 15 February 2013
1102:. 27 December 2016
1084:. Social-Engineer.
870:on 11 October 2007
572:Chapter 2, page 17
380:. You can help by
238:In December 2006,
171:, attackers leave
45:social engineering
39:In the context of
37:
2364:
2363:
2326:Anomaly detection
2231:Secure by default
2084:Keystroke loggers
2019:Drive-by download
1907:vectorial version
1874:Internet security
1822:Computer security
1721:Securityfocus.com
1631:978-0-566-08773-8
1588:EICAR Conference.
747:. 19 March 2019.
567:978-0-470-06852-6
552:Anderson, Ross J.
504:satellite hacking
398:
397:
132:, date of birth,
60:best interests."
2394:
2235:Secure by design
2166:Hardware Trojans
1999:History sniffing
1989:Cross-site leaks
1884:Network security
1801:
1794:
1787:
1778:
1777:
1743:
1741:
1739:
1559:
1558:
1556:
1554:
1542:
1536:
1531:
1525:
1524:
1522:
1520:
1505:
1499:
1498:
1496:
1494:
1479:
1473:
1472:
1470:
1468:
1463:. 31 August 2018
1453:
1447:
1446:
1444:
1442:
1428:
1422:
1421:
1415:
1410:
1408:
1400:
1398:
1396:
1390:
1382:
1376:
1375:
1373:
1371:
1356:
1350:
1349:
1347:
1345:
1325:
1319:
1318:
1316:
1314:
1308:
1300:
1294:
1293:
1291:
1289:
1278:
1272:
1271:
1269:
1267:
1262:on 4 August 2012
1252:
1246:
1245:
1243:
1241:
1230:
1224:
1223:
1221:
1219:
1203:
1197:
1196:
1194:
1192:
1170:
1164:
1163:
1147:
1141:
1140:
1138:
1136:
1121:
1112:
1111:
1109:
1107:
1092:
1086:
1085:
1074:
1068:
1067:
1062:. Archived from
1056:
1050:
1049:
1047:
1045:
1034:
1028:
1027:
1025:
1023:
1012:
1006:
994:
988:
978:
972:
971:
960:
954:
951:
945:
944:
942:
940:
925:
919:
918:
900:
894:
893:
887:
879:
877:
875:
869:
863:. Archived from
862:
854:
848:
847:
845:
843:
828:
822:
821:
819:
817:
806:
800:
790:
784:
783:
781:
779:
767:
761:
760:
758:
756:
737:
731:
730:
702:
696:
695:
683:
677:
674:
668:
667:
651:
645:
644:
604:
598:
597:
595:
593:
579:
573:
571:
548:
393:
390:
372:
365:
185:USB flash drives
85:cognitive biases
57:confidence trick
2402:
2401:
2397:
2396:
2395:
2393:
2392:
2391:
2367:
2366:
2365:
2360:
2210:
1910:
1898:
1889:Copy protection
1879:Mobile security
1810:
1805:
1737:
1735:
1734:on 13 July 2006
1726:
1713:
1708:
1647:Course Workbook
1568:
1566:Further reading
1563:
1562:
1552:
1550:
1543:
1539:
1532:
1528:
1518:
1516:
1506:
1502:
1492:
1490:
1481:
1480:
1476:
1466:
1464:
1455:
1454:
1450:
1440:
1438:
1430:
1429:
1425:
1413:
1411:
1402:
1401:
1394:
1392:
1388:
1384:
1383:
1379:
1369:
1367:
1358:
1357:
1353:
1343:
1341:
1339:
1327:
1326:
1322:
1312:
1310:
1306:
1302:
1301:
1297:
1287:
1285:
1280:
1279:
1275:
1265:
1263:
1254:
1253:
1249:
1239:
1237:
1232:
1231:
1227:
1217:
1215:
1204:
1200:
1190:
1188:
1186:
1172:
1171:
1167:
1148:
1144:
1134:
1132:
1129:www.justice.gov
1123:
1122:
1115:
1105:
1103:
1094:
1093:
1089:
1076:
1075:
1071:
1058:
1057:
1053:
1043:
1041:
1036:
1035:
1031:
1021:
1019:
1014:
1013:
1009:
995:
991:
979:
975:
962:
961:
957:
952:
948:
938:
936:
926:
922:
915:
901:
897:
881:
880:
873:
871:
867:
860:
858:"Archived copy"
856:
855:
851:
841:
839:
838:on 13 July 2006
830:
829:
825:
815:
813:
808:
807:
803:
791:
787:
777:
775:
768:
764:
754:
752:
739:
738:
734:
703:
699:
684:
680:
675:
671:
652:
648:
605:
601:
591:
589:
581:
580:
576:
568:
549:
545:
540:
528:
512:
480:
457:
452:
436:Hillary Clinton
424:
415:drivers license
403:
394:
388:
385:
378:needs expansion
363:
355:Hewlett Packard
348:
346:Hewlett Packard
325:Charles Schumer
293:
256:
236:
220:
208:USB flash drive
204:removable media
161:
148:
142:
107:
101:
81:decision-making
77:
26:
17:
12:
11:
5:
2400:
2390:
2389:
2384:
2379:
2362:
2361:
2359:
2358:
2356:Site isolation
2353:
2348:
2347:
2346:
2340:
2330:
2329:
2328:
2323:
2312:
2307:
2302:
2297:
2292:
2287:
2286:
2285:
2280:
2270:
2269:
2268:
2263:
2262:
2261:
2254:Authentication
2246:
2245:
2244:
2243:
2242:
2232:
2229:
2218:
2216:
2212:
2211:
2209:
2208:
2203:
2198:
2193:
2188:
2183:
2178:
2173:
2168:
2163:
2158:
2153:
2148:
2143:
2138:
2133:
2128:
2123:
2118:
2113:
2108:
2107:
2106:
2096:
2091:
2086:
2081:
2076:
2071:
2066:
2061:
2056:
2054:Email spoofing
2051:
2046:
2041:
2036:
2031:
2026:
2021:
2016:
2011:
2006:
2001:
1996:
1994:DOM clobbering
1991:
1986:
1981:
1976:
1974:Code injection
1971:
1966:
1965:
1964:
1959:
1954:
1949:
1941:
1936:
1931:
1926:
1920:
1918:
1912:
1911:
1901:
1899:
1897:
1896:
1891:
1886:
1881:
1876:
1871:
1866:
1861:
1856:
1854:Cyberterrorism
1851:
1846:
1845:
1844:
1842:Computer fraud
1839:
1829:
1824:
1818:
1816:
1812:
1811:
1804:
1803:
1796:
1789:
1781:
1775:
1774:
1769:Plotkin, Hal.
1767:
1754:
1751:Darknet.org.uk
1744:
1724:
1712:
1711:External links
1709:
1707:
1706:
1699:
1693:
1679:
1657:Wozniak, Steve
1653:Mitnick, Kevin
1650:
1636:Mitnick, Kevin
1633:
1611:
1598:
1589:
1580:
1569:
1567:
1564:
1561:
1560:
1537:
1526:
1500:
1489:. 26 July 2018
1474:
1461:RSA Conference
1448:
1423:
1414:|journal=
1377:
1366:. 14 June 1999
1351:
1337:
1320:
1295:
1273:
1247:
1225:
1214:. academia.edu
1198:
1184:
1165:
1142:
1131:. 13 July 2018
1113:
1087:
1069:
1051:
1029:
1007:
989:
973:
955:
946:
920:
914:978-0071835978
913:
895:
849:
823:
801:
785:
762:
732:
697:
678:
669:
646:
599:
574:
566:
542:
541:
539:
536:
527:
524:
511:
510:Badir Brothers
508:
479:
476:
456:
453:
451:
448:
423:
420:
405:Following the
402:
399:
396:
395:
375:
373:
362:
359:
347:
344:
292:
289:
255:
252:
235:
232:
219:
216:
160:
157:
144:Main article:
141:
138:
103:Main article:
100:
97:
76:
73:
15:
9:
6:
4:
3:
2:
2399:
2388:
2385:
2383:
2380:
2378:
2375:
2374:
2372:
2357:
2354:
2352:
2349:
2344:
2341:
2339:
2336:
2335:
2334:
2331:
2327:
2324:
2321:
2318:
2317:
2316:
2313:
2311:
2308:
2306:
2303:
2301:
2298:
2296:
2293:
2291:
2288:
2284:
2281:
2279:
2276:
2275:
2274:
2271:
2267:
2266:Authorization
2264:
2260:
2257:
2256:
2255:
2252:
2251:
2250:
2247:
2241:
2238:
2237:
2236:
2233:
2230:
2228:
2227:Secure coding
2225:
2224:
2223:
2220:
2219:
2217:
2213:
2207:
2204:
2202:
2199:
2197:
2196:SQL injection
2194:
2192:
2189:
2187:
2184:
2182:
2179:
2177:
2176:Vulnerability
2174:
2172:
2169:
2167:
2164:
2162:
2161:Trojan horses
2159:
2157:
2156:Software bugs
2154:
2152:
2149:
2147:
2144:
2142:
2139:
2137:
2134:
2132:
2129:
2127:
2124:
2122:
2119:
2117:
2114:
2112:
2109:
2105:
2102:
2101:
2100:
2097:
2095:
2092:
2090:
2087:
2085:
2082:
2080:
2077:
2075:
2072:
2070:
2067:
2065:
2062:
2060:
2057:
2055:
2052:
2050:
2047:
2045:
2044:Eavesdropping
2042:
2040:
2037:
2035:
2034:Data scraping
2032:
2030:
2027:
2025:
2022:
2020:
2017:
2015:
2012:
2010:
2007:
2005:
2004:Cryptojacking
2002:
2000:
1997:
1995:
1992:
1990:
1987:
1985:
1982:
1980:
1977:
1975:
1972:
1970:
1967:
1963:
1960:
1958:
1955:
1953:
1950:
1948:
1945:
1944:
1942:
1940:
1937:
1935:
1932:
1930:
1927:
1925:
1922:
1921:
1919:
1917:
1913:
1905:
1895:
1892:
1890:
1887:
1885:
1882:
1880:
1877:
1875:
1872:
1870:
1867:
1865:
1862:
1860:
1857:
1855:
1852:
1850:
1847:
1843:
1840:
1838:
1835:
1834:
1833:
1830:
1828:
1825:
1823:
1820:
1819:
1817:
1813:
1809:
1802:
1797:
1795:
1790:
1788:
1783:
1782:
1779:
1772:
1768:
1765:
1762:
1758:
1755:
1752:
1748:
1745:
1733:
1729:
1725:
1722:
1718:
1715:
1714:
1704:
1700:
1698:
1694:
1692:
1691:0-470-63953-9
1688:
1684:
1680:
1678:
1677:0-7645-4280-X
1674:
1670:
1669:0-471-23712-4
1666:
1662:
1658:
1654:
1651:
1648:
1646:
1641:
1637:
1634:
1632:
1628:
1624:
1623:0-566-08773-1
1620:
1616:
1612:
1609:
1605:
1604:
1599:
1596:
1595:
1590:
1587:
1586:
1581:
1579:
1578:0-553-26350-1
1575:
1571:
1570:
1548:
1541:
1535:
1530:
1515:
1511:
1504:
1488:
1484:
1478:
1462:
1458:
1452:
1437:
1436:BookAuthority
1433:
1427:
1419:
1406:
1387:
1381:
1365:
1361:
1355:
1340:
1338:9781839473036
1334:
1330:
1329:"Cyber Crime"
1324:
1305:
1299:
1283:
1277:
1261:
1257:
1251:
1235:
1229:
1213:
1209:
1202:
1187:
1185:9789351261827
1181:
1177:
1176:
1169:
1161:
1157:
1153:
1146:
1130:
1126:
1120:
1118:
1101:
1097:
1091:
1083:
1079:
1073:
1065:
1061:
1055:
1039:
1033:
1017:
1011:
1005:
1003:
998:
993:
987:
986:0-471-23712-4
983:
977:
969:
965:
959:
950:
935:
934:info security
931:
924:
916:
910:
906:
899:
891:
885:
866:
859:
853:
837:
833:
827:
811:
805:
799:
795:
789:
774:
766:
750:
746:
742:
736:
728:
724:
720:
716:
712:
708:
701:
693:
689:
682:
673:
665:
661:
657:
650:
642:
638:
634:
630:
626:
622:
618:
614:
610:
603:
588:
584:
578:
569:
563:
559:
558:
553:
547:
543:
535:
532:
523:
521:
517:
507:
505:
501:
497:
493:
489:
485:
475:
473:
469:
468:Kevin Mitnick
465:
461:
460:Susan Headley
455:Susan Headley
447:
445:
441:
437:
433:
429:
419:
416:
412:
408:
392:
383:
379:
376:This section
374:
371:
367:
366:
358:
356:
352:
351:Patricia Dunn
343:
341:
337:
333:
330:
326:
320:
318:
313:
309:
306:
302:
298:
288:
286:
281:
277:
274:
270:
265:
261:
251:
249:
245:
241:
231:
229:
225:
215:
211:
209:
205:
201:
197:
193:
188:
186:
182:
178:
174:
170:
166:
156:
153:
147:
137:
135:
131:
127:
123:
119:
115:
111:
106:
96:
94:
88:
86:
82:
72:
69:
67:
61:
58:
54:
50:
46:
42:
34:
30:
24:
19:
2300:Data masking
2145:
1859:Cyberwarfare
1763:
1750:
1736:. Retrieved
1732:the original
1720:
1682:
1660:
1643:
1614:
1608:The Register
1601:
1592:
1583:
1551:. Retrieved
1540:
1529:
1517:. Retrieved
1513:
1503:
1491:. Retrieved
1486:
1477:
1465:. Retrieved
1460:
1451:
1439:. Retrieved
1435:
1426:
1405:cite journal
1393:. Retrieved
1380:
1368:. Retrieved
1363:
1354:
1342:. Retrieved
1323:
1311:. Retrieved
1298:
1286:. Retrieved
1276:
1264:. Retrieved
1260:the original
1250:
1238:. Retrieved
1228:
1216:. Retrieved
1211:
1201:
1189:. Retrieved
1174:
1168:
1159:
1155:
1145:
1133:. Retrieved
1128:
1104:. Retrieved
1099:
1090:
1081:
1072:
1064:the original
1054:
1042:. Retrieved
1032:
1020:. Retrieved
1010:
1000:
992:
976:
967:
958:
949:
937:. Retrieved
933:
923:
904:
898:
872:. Retrieved
865:the original
852:
840:. Retrieved
836:the original
826:
814:. Retrieved
804:
788:
776:. Retrieved
765:
753:. Retrieved
745:BBC Bitesize
744:
735:
710:
706:
700:
691:
681:
672:
663:
659:
649:
616:
612:
602:
590:. Retrieved
586:
577:
556:
546:
529:
513:
488:cold calling
481:
478:Mike Ridpath
458:
440:John Podesta
425:
404:
386:
382:adding to it
377:
349:
321:
307:
304:
294:
282:
278:
264:U.S. Federal
262:(GLBA) is a
257:
237:
221:
212:
195:
189:
177:floppy disks
165:Trojan horse
162:
149:
140:Water holing
129:
117:
113:
109:
108:
89:
78:
70:
62:
55:. A type of
44:
38:
18:
2240:Misuse case
2074:Infostealer
2049:Email fraud
2014:Data breach
1849:Cybergeddon
1659:,. (2002).
1553:14 November
1162:(2): 80(9).
816:23 February
713:: 354–366.
506:and RCMAC.
472:Los Angeles
426:During the
66:geopolitics
2382:Cybercrime
2371:Categories
2305:Encryption
2181:Web shells
2121:Ransomware
2069:Hacktivism
1832:Cybercrime
1642:. (2004).
1519:22 January
1493:22 January
1467:22 January
1441:22 January
1395:13 January
1344:11 January
1313:11 January
1078:"Phishing"
619:: 106307.
538:References
297:Fred Upton
295:U.S. Rep.
224:common law
196:road apple
175:-infected
114:pretextual
110:Pretexting
105:Pretexting
99:Pretexting
2387:Deception
2136:Shellcode
2131:Scareware
1979:Crimeware
1939:Backdoors
778:15 August
641:214111644
633:0747-5632
592:3 October
492:phreaking
464:phreaking
301:Kalamazoo
258:The 1999
83:known as
2310:Firewall
2215:Defenses
2141:Spamming
2126:Rootkits
2099:Phishing
2059:Exploits
1738:23 April
1370:11 April
1288:11 April
1266:11 April
1240:11 April
1191:11 April
1135:7 August
1106:7 August
1022:11 April
1004:News.com
884:cite web
842:23 April
749:Archived
727:86565713
666:(4): 89.
554:(2008).
389:May 2024
336:landline
332:criminal
317:Missouri
312:Illinois
152:websites
118:blagging
2151:Spyware
2094:Payload
2089:Malware
2029:Viruses
2009:Botnets
1916:Threats
1156:Esquire
970:. 2007.
939:28 July
874:2 March
496:hacking
228:privacy
181:CD-ROMs
173:malware
159:Baiting
122:pretext
47:is the
2345:(SIEM)
2322:(HIDS)
2206:Zombie
1943:Bombs
1924:Adware
1689:
1675:
1667:
1629:
1621:
1576:
1335:
1218:11 May
1182:
984:
911:
755:7 July
725:
639:
631:
564:
516:Israel
500:ezines
484:w00w00
413:, and
338:, and
329:felony
244:felony
200:manure
169:attack
112:(adj.
2191:Worms
2186:Wiper
2104:Voice
1952:Logic
1645:CSEPS
1549:. CNN
1514:ISACA
1389:(PDF)
1364:Wired
1307:(PDF)
1044:3 May
868:(PDF)
861:(PDF)
723:S2CID
637:S2CID
466:with
183:, or
35:alert
33:OPSEC
1957:Time
1947:Fork
1740:2014
1687:ISBN
1673:ISBN
1665:ISBN
1627:ISBN
1619:ISBN
1574:ISBN
1555:2019
1521:2020
1495:2020
1469:2020
1443:2020
1418:help
1397:2020
1372:2012
1346:2020
1333:ISBN
1315:2015
1290:2012
1268:2012
1242:2012
1220:2013
1193:2012
1180:ISBN
1137:2024
1108:2024
1046:2024
1024:2012
1002:CNET
982:ISBN
941:2017
909:ISBN
890:link
876:2012
844:2014
818:2017
780:2011
757:2024
629:ISSN
594:2021
562:ISBN
494:and
273:FTCA
130:e.g.
1962:Zip
1671:or
1625:or
1160:124
1100:CNN
796:",
715:doi
621:doi
617:107
522:.
384:.
299:(R-
222:In
218:Law
126:lie
87:.
2373::
1759:,
1749:–
1719:–
1638:,
1606:.
1512:.
1485:.
1459:.
1434:.
1409::
1407:}}
1403:{{
1362:.
1210:.
1158:.
1154:.
1127:.
1116:^
1098:.
1080:.
966:.
932:.
886:}}
882:{{
743:.
721:.
711:83
709:.
690:.
664:11
662:.
658:.
635:.
627:.
615:.
611:.
585:.
310:"
179:,
43:,
1800:e
1793:t
1786:v
1742:.
1705:.
1557:.
1523:.
1497:.
1471:.
1445:.
1420:)
1416:(
1399:.
1374:.
1348:.
1317:.
1292:.
1270:.
1244:.
1222:.
1195:.
1139:.
1110:.
1048:.
1026:.
943:.
917:.
892:)
878:.
846:.
820:.
792:"
759:.
729:.
717::
694:.
643:.
623::
596:.
570:.
391:)
387:(
25:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.