I know what you are thinking, “the Def Con 25 bus just finished running us over, it’s not possibly time for Def Con 26 is it?” My answer to you is, “yes, yes it is.” Not only is it time, but Def Con 26 prep has been in full force. The competitions are prepared, the […]
In This Issue: Two-Factor or Not Two-Factor? Why is This a Question? How does 2FA relate to social engineering? Ryan MacDougall investigates this topic and presents his findings.
Identity thieves are phishing and pilfering your personally identifiable information (PII). Identity fraud reached a record high in 2017 with 16.7 million U.S. victims (an increase of 8 percent over 2016) and $16.8 billion dollars stolen. What can you do to safeguard your PII in 2018? Let’s take a look at three methods criminals are […]
Social Engineering and Interpersonal Relationships. Can social engineering training strengthen our abilities to interact and build real relationships?
Since the election of the current US president, many news agencies have discussed the possibility of social engineering being used as part of targeted influence campaigns and how they may have affected voters during the 2016 election.
Corporate Espionage, The Rise of The Cyber-Mafia. The current generation of cyber-criminals now resembles traditional Mafia organizations. Who are their targets and what are their goals?
Ninety percent of organizations feel vulnerable to insider threats. That alarming statistic was recently published in the annual Insider Threat Report released by Crowd Research Partners. The survey respondents are almost equally worried about malicious insiders (47%) as they are accidental insiders (51%). Recognizing and responding to the risk posed by insider threats is essential. […]
Social Engineer Your Life: Vishing, Phishing, and Impersonation Advice for Daily Use. How do we gauge the ethics of using social engineering outside of a work environment? Cat Murdock explores this topic!