background preloader

Social engineering (security)

Social engineering (security)
Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. The term "social engineering" as an act of psychological manipulation is also associated with the social sciences, but its usage has caught on among computer and information security professionals.[1] All social engineering techniques are based on specific attributes of human decision-making known as cognitive biases.[2] These biases, sometimes called "bugs in the human hardware", are exploited in various combinations to create attack techniques, some of which are listed. The attacks used in social engineering can be used to steal employees' confidential information. Quid pro quo means something for something: U.S.

http://en.wikipedia.org/wiki/Social_engineering_(security)

Related:  Software & programmingSocial EngineeringPolitics, Privacy, Security

Array programming Array programming primitives concisely express broad ideas about data manipulation. The level of conciseness can be dramatic in certain cases: it is not uncommon to find array programming language one-liners that require more than a couple of pages of Java code.[1] APL, designed by Ken Iverson, was the first programming language to provide array programming capabilities. The mnemonic APL refers to the title of his seminal book "A Programming Language" and not to arrays per se. Iverson's contribution to rigor and clarity was probably more important than the simple extension of dimensions to functions.

What is social engineering? - Definition from WhatIs.com Social engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It is one of the greatest threats that organizations today encounter. Why social engineering is performed The man who 'nearly broke the internet' Sven Olaf Kamphuis, taken from his Facebook page. Photograph: Guardian The day Sven Olaf Kamphuis parked his huge orange Mercedes van with its German numberplates outside Bar Javis, in the Catalan town of Granollers, the owner's son snapped a picture with his mobile phone. "Not a lot happens in this street," Maria Cruz, the bar's owner, explained. "And it was so huge, with all those funny antennas and solar panels poking out of the roof, that it blocked the light to the bar."

Man-in-the-middle attack In cryptography and computer security, a man-in-the-middle attack (often abbreviated to MITM, MitM, MIM, MiM or MITMA) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. One example is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject new ones.

grep History[edit] Usage[edit] Grep searches files specified as arguments, or, if missing, the program's standard input. By default, it reports matching lines on standard output, but specific modes of operation may be chosen with command line options. A simple example of a common usage of grep is the following, which searches the file fruitlist.txt for lines containing the text string apple:

Why the world’s technology giants are investing in Africa 14 October 2013Last updated at 19:00 ET By Fiona Graham Technology of business reporter, BBC News, Accra Young people gaining access to technology is key for Africa, tech companies say "I don't understand. 40 maps that explain the world Maps can be a remarkably powerful tool for understanding the world and how it works, but they show only what you ask them to. So when we saw a post sweeping the Web titled "40 maps they didn't teach you in school," one of which happens to be a WorldViews original, I thought we might be able to contribute our own collection. Some of these are pretty nerdy, but I think they're no less fascinating and easily understandable.

Organized Criminals Targeting Individual iPhone, Android Users A well organized criminal group is targeting both iOS and Android users with highly targeted man-in-the-middle attacks, according to a new threat advisory from Akamai Technologies, Inc. "They have a lot of resources," said Rod Soto, principal security researcher in the company's business security unit. For example, they were able to target a group of individuals congregating in an Asian country based on their communications, and then used man-in-the-middle and social engineering to trick users into installing the Xsser mobile remote access Trojan on their mobile devices. The activity was first spotted in September. Soto said he wasn't allowed to reveal any more information about that particular attack, but did say that the criminal group involved was highly sophisticated.

R (programming language) R is a programming language and software environment for statistical computing and graphics. The R language is widely used among statisticians and data miners for developing statistical software[2][3] and data analysis.[3] Polls, surveys of data miners, and studies of scholarly literature databases show that R's popularity has increased substantially in recent years.[4][5][6][7] R is highly extensible through the use of user-submitted packages for specific functions or specific areas of study. Due to its S heritage, R has stronger object-oriented programming facilities than most statistical computing languages. Extending R is also eased by its lexical scoping rules.[19] Another strength of R is static graphics, which can produce publication-quality graphs, including mathematical symbols.

Rabies, a neglected, fatal disease - Gauteng THE STARDr Jacqueline Weyer of the National Institute for Communicable Diseases and Human Rabies in South Africa in a laboratory at her workplace in Sandringham, Joburg. Photo: Boxer Ngwenya Johannesburg - A child foaming at the mouth, holding on to bed rails while having a violent convulsion; a seemingly violent, delirious dog growling with saliva dripping from its sharpened teeth.

Related: