Web Beacons for Social Engineering Reconnaissance

Web beacons embedded in pages and emails can be used as reconnaissance tools for social engineering attacks. We've got…

Read More

Researchers Use Sound Waves to control a Smartphone (seriously) and a Car (theoretically)

Both Fitbits and smartphones have Micro electro-mechanical systems (MEMS) accelerometers. Is there potential for misuse…

Read More

Children Hacking Websites

Headlines abound with stories of children hacking websites. How can you teach your kids to be safe and responsible…

Read More

SECTF4Kids & SECTF4Teens at DEF CON 25

The SECTF4Kids is back for a 5th year and the all new SECTF4Teens is now live and waiting for you to register. Get all…

Read More

The Rise of Machine Learning and Social Engineering Attacks

Artificial Intelligence (A.I.) has been in the news a lot lately. If A.I. can be taught to interact with humans in a…

Read More

Not Your Average (G.I.) Joe

Just how safe are those connected toys like CloudPets, Cayla, and Hello Barbie? As IoT becomes more commonplace in our…

Read More

I Spy With My Little EyePyramid: Siblings Phish Italy

Siblings phish Italy operating under the radar of law enforcement for nearly 7 years. Their targets included 2 former…

Read More

The DEF CON 25 SECTF LAUNCH

The DEF CON 25 SECTF LAUNCH. This is your chance to schmooze, vish, elicit, smooth-talk, and social engineer in front…

Read More