Prepare your family as it’s just about that time for SEORG and the SEVillage at DEF CON to start accepting registrants for the #SECTF4Kids competition to be held Saturday, August 8th at DEF CON 23. Last year’s competition kept the kids and their parents busy almost the whole day. We can’t tell you how rewarding it was to have the kids work so diligently to finish all the activities and puzzles. Even though a winning team had already finished, other teams were having so much fun that they pushed on in order to complete the competition. It made the hours and hours (and hours!) we put into designing the thing worth it!
There are those who loved school and those who, like Ferris Bueller, loved getting out of school. You really can’t get much more classic SE than Ferris Bueller’s Day Off, but where the movie focused on the power of manipulation and rapport to escape, SEORG is getting more and more reports of students focused on Continue Reading >
In the midst of all the recent articles about information breaches, a trend is emerging. We seem to be hearing more lately that prevention of breaches, while not to be ignored, should not be the sole focus of digital or physical security programs. More news articles, tweets from the infosec community, and even commercial products Continue Reading >
Yes, the kittens are cute and who wouldn’t want to see another photo of the latest celebrity embarrassing themselves? But can we all just agree that as cool as the latest trending video is on Facebook, it’s probably not worth getting infected over? We’re sure you’ve heard about the malware infecting 110,000 Facebook users. Yes, Continue Reading >
Sometimes in the tech field, we can get so caught up in “what’s new” that we lose sight of the importance of “what’s practical.” The coolest new digital hacks are interesting but when it comes to information security, longevity and popularity of attacks relevant to your industry are what awareness campaigns are built on. The Continue Reading >
Vishing, or eliciting information over the phone, is a common social attack vector. It’s proven to be one of the most successful methods of gaining information needed to breach an organization, even when used by an inexperienced attacker. When you can’t hack your way through your pentest, when you can’t break in with your red-team, Continue Reading >