Defcon Hackers Steal Data from Oracle – REALLY?

With that in mind we wanted to take a minute to address some of the false conclusions that are being made based on some…

Read More

Metasploit: A Penetration Testers Guide book from NoStarch Press

This book is for all audiences, whether you are new or a pro. I personally love how they had all these different…

Read More

How Strong Is Your Schmooze Kids Edition

In conjunction with Defcon, Social-Engineer.Org is hosting the first ever KIDS CTF. As part of the 2 day long Security…

Read More

How I Won The Defcon Social Engineering CTF

As the contestants for the Social-Engineer.Org SECTF at Defcon 19 are underway, we want to give a little help. Our…

Read More

Influence With Out Deception – Possible?

hey presented the question, "Is it possible to influence someone to take an action not with in their best interest with…

Read More

Microexpressions – A Key to Studying Human Behavior

Microexpressions are valuable for social engineers. Being able to read and decipher microexpressions is an essential…

Read More

Creepy Tools for Social Engineers and Information Gathering

Creepy is a geolocation tool that helps social engineers perform successful information gathering.

Read More

The Schmooze Strikes Back

In our continued efforts to raise awareness - Social-Engineer.org is proud to announce the Defcon 19 Social Engineering…

Read More

Etsy – You Are What You Buy

I would be willing to guess that most of the users who are on that site do not want anyone knowing this level of…

Read More

Social Engineer The Book Reviewed on Slashdot

Just a little bit ago I was linked to a review done by a gentlemen named, Ben Rothke. Ben wrote a really nice and very…

Read More