Web beacons embedded in pages and emails can be used as reconnaissance tools for social engineering attacks. We’ve got tips and tools to minimize your exposure.
In This Issue: “The Weaponizing of Social Media.” Cyber criminals are taking advantage of the trust we have in social media sites and have been using them to gain access to corporate and government networks. In this issue find out how attackers use social media as a weapon and what you can do to protect yourself.
Both Fitbits and smartphones have Micro electro-mechanical systems (MEMS) accelerometers. Is there potential for misuse in a social engineering?
In This Issue: “Ransomware and The Psychology Behind Why it Works.” Attackers are tapping into people’s psyches and pushing the right buttons to make them pay. Don’t fall fall for their mind games. Find out what you can do to minimize the risk.
Yes, you have read this correctly. This year in the SEVillage at DerbyCon, Social-Engineer will be holding its first ever Social Engineering Capture The Flag event at DerbyCon!
In This Issue: “I’ve Got a Bridge I’d Like To Sell You.” We’ve all heard of the George C. Parker scam. Did you know that the modern twist on this old scam is deed fraud? Don’t get caught in this scam. Find out what you can do to minimize the risks as property owners and buyers.
Headlines abound with stories of children hacking websites. How can you teach your kids to be safe and responsible online? We’ve got tips on how to help them learn skills without regrets.
In This Issue: “Counseling vs. SE Skills: A Venn Diagram.” Michele Fincher explores the common ground between professional social engineer’s and counselors. Learn how that knowledge can be used to up your security testing game.