Social Engineering Assessments

As computer and information security continues to evolve, many organizations have become well positioned to prevent and manage attacks related to their network perimeter and public applications. As attackers continually search for the lowest-hanging fruit, it has become clear through recent events that targeted phishing campaigns and other social engineering attacks are an effective and low-cost way for attackers to obtain access to an organization's most sensitive networks and data.

VSR's social engineering assessments can be tailored a variety of goals, including any or all of the following:

Most social engineering assessments consist of several different types of attacks launched over the course of one to two weeks. Customers can expect a set of detailed statistics about how each attack succeeded or failed, and typically come away with a renewed appreciation for how effective these attacks can be.

2014-09-17
Apple iOS / OSX: Foundation NSXMLParser XXE Vulnerability

2014-05-20
XML Schema, DTD, and Entity Attacks

2013-06-19
IBM WebSphere Commerce: Encrypted URL Parameter Vulnerable to POA

2012-10-23
Timothy D. Morgan presents No Crack Required: Cryptanalysis in Real-World Applications at OWASP AppSecUSA 2012.

more...

Contact us by phone,
fax or e-mail:

Phone: 617.933.8919
Fax: 617.933.8920
Email: inquiry@vsecurity.com