Security training and awareness must focus on risk scenarios that include the human element. The 2017 Verizon’s Data Breach Digest found that 90 percent of data-loss incidents have a phishing or social engineering component.
‘Tis the season… the season of traveling, whether that be to your grandma’s house or other friends and family. To save a few bucks, families will often opt for a road trip over flying and, while Social-Engineer has discussed the possible perils to your personally identifiable information (PII) associated with flight travel, we wouldn’t want […]
Let’s talk about it October brought Social-Engineer to the SEVillage at DerbyCon 8.0 – Evolution, SEORG’s final SEVillage for the year, and WOW, was it an AMAZING DerbyCon. Ryan and Colin arrived Tuesday to set up shop and stuff many padfolios to prepare for their OSINT class that ran over Wednesday and Thursday. The OSINT […]
The Internet of Things (IoT) is rapidly showing up in all facets of daily life and collecting personally identifiable information (PII) in massive quantities. From smart home thermostats to one-click purchasing, IoT devices collect PII to personalize experiences for consumers. In an increasingly digital and connected world, unprecedented immersion into environments of convenience, knowledge, and accessibility has become the norm. […]
The Social-Engineer team is collectively wrapping up their annual post-DEF CON foggy state, unburying from their backlog, and reminiscing on the amazingness that was the SEVillage at DEF CON 26. Can we say “WOW?” This was the SEVillage’s biggest (and arguably best) year yet and, though it has taken a full two weeks to overcome […]
Charlie Shrem, age 11, invests early and makes millions in Bitcoin! Dave Carlson makes $8 million per month in Bitcoin! Inspired by these and other true-life stories, some have felt that with the right timing, they too can get in early and become the next cryptocurrency millionaire.
The recent Facebook-Cambridge Analytica data scandal put a spotlight on the nebulous world of data brokers and data mining. As you shop, browse the Internet, participate in a quiz, subscribe to a magazine, fill a prescription, or network on social media, data brokers are hovering in the background, stealthily collecting your personal information. In the […]