Social Engineering Assessments

As computer and information security continues to evolve, many organizations have become well positioned to prevent and manage attacks related to their network perimeter and public applications. As attackers continually search for the lowest-hanging fruit, it has become clear through recent events that targeted phishing campaigns and other social engineering attacks are an effective and low-cost way for attackers to obtain access to an organization's most sensitive networks and data.

VSR's social engineering assessments can be tailored a variety of goals, including any or all of the following:

Most social engineering assessments consist of several different types of attacks launched over the course of one to two weeks. Customers can expect a set of detailed statistics about how each attack succeeded or failed, and typically come away with a renewed appreciation for how effective these attacks can be.

Apple iOS / OSX: Foundation NSXMLParser XXE Vulnerability

XML Schema, DTD, and Entity Attacks

IBM WebSphere Commerce: Encrypted URL Parameter Vulnerable to POA

Timothy D. Morgan presents No Crack Required: Cryptanalysis in Real-World Applications at OWASP AppSecUSA 2012.


Contact us by phone,
fax or e-mail:

Phone: 617.933.8919
Fax: 617.933.8920