Tag

social engineering

0 views collected around this technical thread.

Sohu Tech Products
Sohu Tech Products
Dec 20, 2023 · Information Security

Understanding Self‑XSS Warnings in Chrome DevTools

Chrome DevTools now shows a Self‑XSS warning when an inexperienced user tries to paste code, using a simple heuristic that checks for at least five console‑history entries, requiring the user to type “allow pasting” before execution, to protect against social‑engineered attacks that could steal data or hijack accounts.

Browser WarningChrome DevToolsSelf-XSS
0 likes · 7 min read
Understanding Self‑XSS Warnings in Chrome DevTools
Architects Research Society
Architects Research Society
Oct 14, 2023 · Information Security

How Hackers Target the Personal Lives of Top Executives and How to Defend

The article explains how C‑suite executives become prime targets for hackers through data broker profiles, insecure home networks, personal accounts, ransomware, and family members, and provides practical steps to reduce their personal attack surface and improve overall security.

C-suite securityhome network securityinformation security
0 likes · 14 min read
How Hackers Target the Personal Lives of Top Executives and How to Defend
Sohu Tech Products
Sohu Tech Products
Sep 7, 2022 · Information Security

Phishing Techniques: Theory, Classification, and Defense Strategies

The article provides a comprehensive overview of phishing as a social‑engineering attack, detailing its various techniques—including email deception, spear‑phishing, whaling, malware‑based lures, domain spoofing, vishing, SMS and QR‑code scams—and offers practical defense measures such as anti‑phishing tools, multi‑factor authentication, content filtering, and security standards.

Defense Strategiesemail securitymalware
0 likes · 14 min read
Phishing Techniques: Theory, Classification, and Defense Strategies
Python Programming Learning Circle
Python Programming Learning Circle
Dec 30, 2021 · Information Security

A Personal Penetration Test Narrative: Hacking a Fraudulent Reseller with Python Tools

The author recounts a step‑by‑step penetration test against a fraudulent reseller, detailing OSINT gathering, port scanning, FTP brute‑forcing, JavaScript injection, location tracking, domain hijacking, and the deployment of custom Python scripts for each stage.

Pythonftp brute forceinformation security
0 likes · 7 min read
A Personal Penetration Test Narrative: Hacking a Fraudulent Reseller with Python Tools