August 9, 2011
Defcon Hackers Steal Data from Oracle – REALLY?
With that in mind we wanted to take a minute to address some of the false conclusions that are being made based on some…
July 12, 2011
Metasploit: A Penetration Testers Guide book from NoStarch Press
This book is for all audiences, whether you are new or a pro. I personally love how they had all these different…
June 23, 2011
How Strong Is Your Schmooze Kids Edition
In conjunction with Defcon, Social-Engineer.Org is hosting the first ever KIDS CTF. As part of the 2 day long Security…
June 9, 2011
How I Won The Defcon Social Engineering CTF
As the contestants for the Social-Engineer.Org SECTF at Defcon 19 are underway, we want to give a little help. Our…
May 3, 2011
Influence With Out Deception – Possible?
hey presented the question, "Is it possible to influence someone to take an action not with in their best interest with…
March 29, 2011
Microexpressions – A Key to Studying Human Behavior
Microexpressions are valuable for social engineers. Being able to read and decipher microexpressions is an essential…
March 28, 2011
Creepy Tools for Social Engineers and Information Gathering
Creepy is a geolocation tool that helps social engineers perform successful information gathering.
March 22, 2011
The Schmooze Strikes Back
In our continued efforts to raise awareness - Social-Engineer.org is proud to announce the Defcon 19 Social Engineering…
March 15, 2011
Etsy – You Are What You Buy
I would be willing to guess that most of the users who are on that site do not want anyone knowing this level of…
March 9, 2011
Social Engineer The Book Reviewed on Slashdot
Just a little bit ago I was linked to a review done by a gentlemen named, Ben Rothke. Ben wrote a really nice and very…