Security training and awareness must focus on risk scenarios that include the human element. The 2017 Verizon’s Data Breach Digest found that 90 percent of data-loss incidents have a phishing or social engineering component.
Let’s talk about it October brought Social-Engineer to the SEVillage at DerbyCon 8.0 – Evolution, SEORG’s final SEVillage for the year, and WOW, was it an AMAZING DerbyCon. Ryan and Colin arrived Tuesday to set up shop and stuff many padfolios to prepare for their OSINT class that ran over Wednesday and Thursday. The OSINT […]
The Internet of Things (IoT) is rapidly showing up in all facets of daily life and collecting personally identifiable information (PII) in massive quantities. From smart home thermostats to one-click purchasing, IoT devices collect PII to personalize experiences for consumers. In an increasingly digital and connected world, unprecedented immersion into environments of convenience, knowledge, and accessibility has become the norm. […]
Charlie Shrem, age 11, invests early and makes millions in Bitcoin! Dave Carlson makes $8 million per month in Bitcoin! Inspired by these and other true-life stories, some have felt that with the right timing, they too can get in early and become the next cryptocurrency millionaire.
The recent Facebook-Cambridge Analytica data scandal put a spotlight on the nebulous world of data brokers and data mining. As you shop, browse the Internet, participate in a quiz, subscribe to a magazine, fill a prescription, or network on social media, data brokers are hovering in the background, stealthily collecting your personal information. In the […]
Identity thieves are phishing and pilfering your personally identifiable information (PII). Identity fraud reached a record high in 2017 with 16.7 million U.S. victims (an increase of 8 percent over 2016) and $16.8 billion dollars stolen. What can you do to safeguard your PII in 2018? Let’s take a look at three methods criminals are […]
It’s hard to believe that Social-Engineer.org (SEORG) has been hosting the SECTF event for the past eight years. From small beginnings in 2010 the SECTF has grown into one of the most anticipated events at the SEVillage.
Malicious attackers are tireless as they search for personal and professional information; and they want it all. That information provides attackers with the knowledge needed to coordinate an approach that will elicit the right emotional response to achieve the desired compromise or breach. Where are they finding all this information? Let’s take a look at […]