SECTF at DEF CON 22 – TAG TEAMS

SECTF-Tag-Team-WebGFX

Wait?  Is it really that time again?  No, it can’t be.  I mean didn’t we just leave DEF CON, like what… five minutes ago?  (checks watch)

Nope, its that time folks.  DEF CON will be upon us like a crazed starving vulture picking apart our brains and leaving us in heaps of sleepless, unshowered, prehuman piles before you know it.

As with the last 4 DEF CON’s it is time for the SECTF.  This year we were challenged, no dare I say, prodded to make the SECTF more difficult, more fun and even more crazy. Continue Reading >

Unmasking The Social Engineer – Released!

9781118608579

I literally found just a few minutes before my next plane ride.. no, really I’m not kidding.  We have been busy little social engineers.  Last year was a year of growth, exploration and mental expansion. I am finally getting a chance to let everyone know that the book has been released. Unmasking the Social Engineer: The Continue Reading >

The Humorous Side to Info Gathering

TinFoilBunny

Information is the crux of any social engineering engagement. It merits then that we talk bout Info Gathering often.  It just so happens that at times there are stories in the news that highlight what happens when people are overconfident and post dumb things online. Overconfidence has led to military and political defeats, huge professional sports upsets Continue Reading >

Social-Engineer in 2014

new-stuff

I want to start off this newsletter with a thank you.  Five years ago when we started our little website, blog, newsletter and podcast we never knew it would turn into what it has today.  Recently, we have had some nice growth and for the last few months you have been enjoying some great newsletters Continue Reading >

Identity Theft and the Student

identity_theft

Think you’re safe because you’re an upstanding citizen and don’t engage in risky online behaviors? Think again. Two identity thieves recently attempted to cheat  over one hundred Emory University graduates after stealing their identities and obtaining loans using the stolen information.