The other day I had a pizza delivered to my home using my Visa. When the pizza arrived, however, the driver refused to give it to me unless I either gave him my social security number or let him write down my driver’s license number. I refused because of identity-theft and general privacy concerns. I offered to show him my driver’s license and the Visa card I’d used to order the pizza, but he said he had to write down one or the other number.
The awareness that has been raised is just amazing. There has been many stories written and podcasts discussing the contest and what the rules are. People are wondering and very curious about what it will entail. There has been numerous alerts issued from various agencies about the contest. I will post one of them below.
Predators are using MS Live Game system to attack unknowing children and use malicious social engineering to entrap them.
We are inviting those of you who think you can use ethical social engineering skills to stretch your limits as a social engineer. A unique blend of information gathering, planning and attack vector execution will challenge the very core of every participant.
Social Engineers have a field day when it comes to any social media site that is talking about security. If you read the news at all, you have heard about Facebook’s recent barrage of security announcements and the feelings many have on their “security”.
It is logical that with all the information we release on prevention of social engineering attacks, employee deception, fraud and identity theft we would receive questions on how to choose a good auditor.
Social Engineer.org sent out a plea to help us analyze and decipher this large report. What we came up with was a two part blog post that will analyze this story from some unique perspectives.
Even armed with this knowledge there are some things we must be aware of to avoid falling prey to a scam that can lead to identity theft. It is not private knowledge that 100 million surveys are being sent this week. You know it, I know it and all malicious scammers and social engineers know it too. Be aware of these attacks
Yet we get a lot of requests for tutorials and/or training on how to effectively use the tool.
The Social-Engineer Toolkit (SET) has progressed over the months thanks to the suggestions and collaboration with the security community. With this version, I am proud to announce the immediate release of the Social-Engineer Toolkit v0.5