Use the Requirements Already - I am working on a release at work. Initially we were supposed to replicate some bunch of database tables that the customer had in an old system. We did a ...
Beware of Emily
Some bad boys came up with a plan to infiltrate a government security agency. They set up a fake social media profile of a hottie. They used some random good looking girl's photo. They also made it seem like she graduated from MIT. Her resume boasted 10 years experience in the industry. Poor government officials had no chance.
Emily started making virtual connections. Got some FaceBook likes and friends. Also got some LinkedIn love. It was not long before she was getting offers to help her cut through the red tape to get jobs at government agencies and commercial companies alike.
Did I mention that some emails sent from emily had viruses in the payload? Yep. Government computers compromised. What is a security professional to do? Guys cannot help themselves when they see poor Emily needing an assist. Social engineering at its best.