Compass IT Compliance Blog / Vishing (2)

Bypassing Multi-Factor Authentication via Prompt Bombing

A woman logs into Facebook on her phone

It is the middle of the night, and you have finally fallen asleep, only to be awakened by the constant beeping of your phone. Bleary-eyed, you look at your phone to see it is prompting you to agree to log in on one of your accounts. You half wonder if you are dreaming and may instinct …

Read Story

Receiving a Scam Text… From My Own Phone Number

Verizon Building

Throughout my years working in the IT security and compliance field I have had the opportunity to learn about dozens of different social engineering attack strategies that malicious actors will utilize to achieve their goals. This past weekend, I had the unique opportunity to witness …

Read Story

‘Tis the Season – Don’t Fa La La to Holiday Scams

‘Tis the Season – Don’t Fa La La to Holiday Scams

As another holiday season quickly approaches and holiday gift lists are started, the scammers are also looking to deck the halls during one of their favorite times of the year. As many begin planning for shopping and holiday festivities, unscrupulous scammers are presented with ample …

Read Story

Combating Cognitive Bias to Mitigate Social Engineering Attacks

An anatomical model of half a human brain

“When dealing with people, remember you are not dealing with creatures of logic, but with creatures bristling with prejudice and motivated by pride and vanity” – Dale Carnegie In this quote, American writer and lecturer Dale Carnegie touches upon the topic of cognitive bias.

Read Story

Situational Awareness – How Strong Are Your Spidey Senses?

Spiderman

How aware are we of our surroundings? What is happening around us that we are not aware of? Being more cognitive of our surroundings at work and at home can bring a lot of positive results to our corporate security posture.

Read Story

Examples of Effective Vishing Attacks

Examples of Effective Vishing Attacks

Vishing (not to be confused with phishing) is a form of social engineering that attempts to manipulate an individual to give an attacker personal information like usernames and passwords, credit card information, and social security numbers via the telephone. The attacker will call an …

Read Story

Subscribe by email