Joan GoodchildEditor, Online, CSO Follow me on Google+

Joan Goodchild is responsible for editorial strategy and writes frequently about security leadership, social engineering, social media security and cybercrime in her role as Editor of CSO. Her previous experience in business journalism includes roles as broadcast and web editor with the Boston Business Journal and as a news writer covering the Windows OS with TechTarget. Prior to that, she worked as a television reporter and anchor for more than a decade. Joan has a Master's degree in journalism from Northwestern University's Medill School of Journalism.

A hacker's story: Mitchell Frost explains his motivation

As a 19-year-old college student In 2006, Mitchell Frost used a campus network to launch botnets against several conservative web sites; here is his story.

10 Hacks That Made Headlines

Hacking has been around for decades, starting with curiosity-driven systems break-ins. Today's crimes are often financially-motivated fraud. Here are ten hacking incidents that made history.

Not Just April Fools: Best Social Engineering Movies

When the scam is happening to someone else, it can make for great cinema. Here are seven of our favorites.

Hackers' Host Tells How it Protected LulzSec

Hosting service CloudFlare shares details of the "intense" experience of fielding attacks on the hacking site.

Facebook Users Flooded with Adult Images in Mystery Hack

Some of the images include a Photoshopped picture of Justin Bieber in a pornographic situation and a bloodied, dead dog.

New Social Engineering Poll Reveals Which Scam Works Better

Which tactic works best for a scamming social engineer?

Security on a Shoestring Budget

Among large companies, the average security budget is $3.35 million.

5 Dirty Tricks: Social Engineers' Latest Pick-up Lines

You may now be savvy enough to know that when a friend reaches out on Facebook and says they've been mugged in London and need cash, that it's a scam. But social engineers are one step ahead of you.

Mobile Device Security: Questions to Ask for Creating Policy

While 69 percent of organizations have employees using personal devices to connect to their corporate network, more than one-fifth, or 21 percent, currently have no policy in place to govern the use of personal mobile devices on their network.

Many Employees Would Sell Corporate Information, Study Says

A survey of more than 3,400 employees in the United States, Great Britain and Australia finds corporate loyalty be damned, your company's data may be on its way out the door when certain employees resign or get laid off.

Social Engineering: 3 Mobile Malware Techniques

Social engineers fool unsuspecting by pretending to be old friends or trusted authorities on email and social networks.

IT and Security Can't Keep Up With Consumer Device Use

IT managers are slowly embracing the growing number of consumer devices such as iPhones and iPads in the workplace. But that doesn't mean they're ready.

Twitter Scam Promises Followers -- for a Price

A con job on the microblogging site promises to increase a user's followers, but actually steals the account.

4 Tips on How to Use Facebook Legally to Conduct Background Checks

As more people create Facebook profiles (500 million and growing), and sign on other social media sites, hiring managers find new ways to vet prospective employees.

on techhive.com

Virtualized Environments Are Painfully Insecure

John Burke of Nemertes Research says while organizations are hot for virtualization technology, they are ignoring security in the rush to adopt