Innocence of the Media

By now, you are all familiar with “The Innocence of Muslims”, an amateur “film” produced by Nakoula Basseley Nakoula,…

Read More

DerbyCon 2012 – The Reunion and Social Engineering

Last year Derby Con took the con scheme by storm. What started as a neat idea amongst a few friends turned into what…

Read More

Defcon 20 – What the heck just happened?

Defcon 20 proved to be one of the hardest yet most rewarding events we have been a part of since we started on our…

Read More

Social Engineering and Weak Security Affect Apple and Amazon

If you’ve been following tech at all in the last few days, you have undoubtedly already heard that an iCloud account…

Read More

Spearing the biggest phish

We will continue to see Social Engineering used in attacks because it is cheap and extremely effective

Read More

Confidential – By John Nolan

John and his crew did a limited reprint and are now selling it on Social-Engineer.Com. We say "limited time" because…

Read More

Citadel Trojan uses insidious forms of Social Engineering

The Citadel is a chimera of the Zeus trojan, ransomware, scareware and social-networking. This trojan is especially…

Read More

“Too Cheap To Hire a Designer” Contest WINNER

A few weeks ago we had sent the request out to run our first ever "We're Too Cheap To Hire a Designer" Tee Shirt…

Read More

Defcon 20 SECTF For Kids: Return of the Schmooze

We're proud to announce our answer with “Return of the Schmooze” Kid’s SE CTF with harder ciphers, tougher puzzles, and…

Read More

Defcon 20 SECTF – Battle of the SExes

This year at Defcon 20 the Social Engineering CTF is titled “The Battle of the SExes”. The rules have been modified,…

Read More