Identity fraud reached a record high in 2017 with 16.7 million U.S. victims and $16.8 billion dollars stolen. Find out what can you do to safeguard your PII in 2018.
In the current information age, it may be difficult to determine what information is real. Social engineering awareness training often promotes critical thinking as the go-to form of defense against these threats.
Malicious insiders with privileged access create significant risk. Don’t ignore insider threats. Learn to recognize and respond to the risk within.
It is that time of year again – DEF CON is only a mere 7 months away. It is time to start setting up for the SECTF and the SE Speeches in the SEVillage.
Social-Engineer.org (SEORG) has been hosting the SECTF event for the past eight years. Join us as we look back and review SECTF at DEF CON 2010-2017
Have you locked down your accounts? Malicious attackers are searching for information on social media platforms such as Facebook and LinkedIn. Find out what we can learn from Cobalt Gypsy’s created persona ‘Mia Ash’.
2017 proved to be a huge year for Social-Engineer. Complete with two SE Capture the Flags. This means our report this year is compiled from data from both of the SECTF’s. Download a copy of the report now and sign up for a free webinar.
Back in March we talked about Adobe’s Project VoCo which could recreate someone’s speech with only twenty minutes of recorded dialogue. Now just a few months later, Lyrebird claims it can recreate any voice with just one minute of recorded speech!
Relive all the amazing moments we had at DEF CON 25! Get all the details about our three SECTF competitions and so much more!
Web beacons embedded in pages and emails can be used as reconnaissance tools for social engineering attacks. We’ve got tips and tools to minimize your exposure.