Social media has become a huge attack vector. Learn why social media scams such as quizzes, romance scams, and social phishing are becoming more popular and what you can do you protect yourself.
Search by Tag:body language Cat Murdock Chris Hadnagy critical thinking CTF Dave Kennedy David Kennedy deception DEF CON DEFCON ekman elicitation exploit fincher hacking Hadnagy how-to impersonation influence information gathering malicious Michele Fincher nonverbal OSINT phishing ping look podcast pretext rapport research Robin Dreeke SE attack SE awareness sectf SECTF4KIDS Security Awareness SE in daily life SE skills SEvillage social engineer Social Engineering social media spear phishing vishing vulnerability
Search results for: social media
Have you locked down your accounts? Malicious attackers are searching for information on social media platforms such as Facebook and LinkedIn. Find out what we can learn from Cobalt Gypsy’s created persona ‘Mia Ash’.
The Beat links geo information embedded within Instagram images to Google Streetview. This is then made searchable using tags from Instagram
Being able to build a successful profile is an essential tool for a social engineer. There are tools out there that specialize in gathering and detailing information on targets. What about social media? Chris Sumner helps us to use social media to build effective profiles on our targets Release Date Feb 13 2012 1 Download […]
White Canvas Group is a small collection of social media geniuses. We are talking with their front man, Chris Dufour about how social media is being and can be engineered for the good, the bad and the ugly. Feb 10, 2014 Contents 1 Download 2 Podcast Notes 3 Get Involved
In This Issue: “Back to School: Education Through Security.” With data breaches happening almost every day and the dangers that lurk online, back to school season can be overwhelming. Protecting ourselves and our children needs to be a priority.
In This Issue: “The CEO/BEC Scam: How Criminals Target Emotions”. According to the 2019 Verizon Data Breach Investigations Report (DBIR) 33% of confirmed data breaches were the result of social attacks. For each statistic, there is a person and a story. Our goal this month is to shine a spotlight on the mental and emotional distress victims of social attacks experience.
In This Issue: “SE Village — 10 Years in Review.” The SEVillage is the epicenter for all things social engineering. On this 10 year anniversary we review everything that has been accomplished.