In This Issue: “Are You Being Skimmed?” A Google News search revealed over 1700 articles about skimmers in the past thirty days, and there are probably thousands out there that haven’t been discovered yet. Find out how thieves are retrieving the data and how you can protect yourself.
Back in March we talked about Adobe’s Project VoCo which could recreate someone’s speech with only twenty minutes of recorded dialogue. Now just a few months later, Lyrebird claims it can recreate any voice with just one minute of recorded speech!
Relive all the amazing moments we had at DEF CON 25! Get all the details about our three SECTF competitions and so much more!
In This Issue: “Lessons from Disasters to Improve Security.” Most of you have heard of the fight-or-flight response. Recently, behavioral scientists have updated this theory to include a third option, which is to freeze. In this newsletter find out how knowing this can improve security training and awareness.
Web beacons embedded in pages and emails can be used as reconnaissance tools for social engineering attacks. We’ve got tips and tools to minimize your exposure.
In This Issue: “The Weaponizing of Social Media.” Cyber criminals are taking advantage of the trust we have in social media sites and have been using them to gain access to corporate and government networks. In this issue find out how attackers use social media as a weapon and what you can do to protect yourself.
Both Fitbits and smartphones have Micro electro-mechanical systems (MEMS) accelerometers. Is there potential for misuse in a social engineering?
In This Issue: “Ransomware and The Psychology Behind Why it Works.” Attackers are tapping into people’s psyches and pushing the right buttons to make them pay. Don’t fall fall for their mind games. Find out what you can do to minimize the risk.