Artificial Intelligence (A.I.) has been in the news a lot lately. Some say that AI will take human jobs in the future; others tout its ability to simplify everyday tasks, some are embracing it for the ability to offer a quicker defense against cyber attacks, and Gartner predicts by 2020 we will interact more with chatbots than we do with our own spouses. Continue Reading >
Back in 2015 we reported on the possible vulnerabilities in the IoT web-connected Hello Barbie doll, and the possibility of privacy and security breaches from the cloud stored communications of children. Two weeks ago Germany banned the interactive Cayla doll from stores and issued warnings to parents that had purchased it. The Cayla doll was Continue Reading >
In recent news, Italian siblings 45-year-old Giulio Occhionero and his 47-year-old sister Francesca Maria Occhionero were arrested for having installed malware on a major bank president’s system, 2 former prime ministers, a sitting mayor, a former deputy governor of the Bank of Italy and thousands more.
We know it’s only February, but it’s time to start thinking about DEF CON 25 and the Social Engineer Capture the Flag competition (SECTF for those of you in the know). The SECTF is your chance to publicly schmooze, vish, elicit, smooth-talk, and social engineer in front of an eager audience of peers for Continue Reading >
People lie. It’s a fact of life. Recently at my 10 year reunion, I overheard people say they worked in everything from medicine to engineering, when I knew that these people worked in a big box retail store occasionally moving shelves and stocking meds. My wife lies to me every time I get excited about Continue Reading >
Friday, October 21st was a rough day for many on the internet. This was the day a massive DDoS attack took place against Dyn DNS; taking sites like Twitter, Amazon, New York Times, and many others off line. With our favorite social media tools down OSINT was slim, so we had to find other ways Continue Reading >
Recent headlines have thrown social engineering tactics back into the spotlight and with the election, it’s no wonder that the candidates are the primary targets of attacks. In recent months Robert Podesta, Colin Powell and the Democratic National Convention have had emails dumped to WikiLeaks by persons unknown. While many of these are attributed Continue Reading >