As a parent of an 11-year-old boy, I always wonder what he’s going to get himself into. (usually after reflecting on what I did when I was younger) I didn’t want him not to use technology, so I started him off with an iPod then when I got a new iPad, I gave him my […]
You have been hitting refresh on your keyboard nonstop. You have been nagging your parents. Even some of you have gotten your parents to email us asking when we will announce….. The time is here. The SECTF4Kids is back for a 5th year and the all new SECTF4Teens is now live and waiting for you […]
We are excited to announce the launch of The Human Track CFP is now open. Be quick about applying as we are closing the doors May 15! See you at DEF CON!
Back in 2015 we reported on the possible vulnerabilities in the IoT web-connected Hello Barbie doll, and the possibility of privacy and security breaches from the cloud stored communications of children. Two weeks ago Germany banned the interactive Cayla doll from stores and issued warnings to parents that had purchased it. The Cayla doll was […]
We know it’s only February, but it’s time to start thinking about DEF CON 25 and the Social Engineer Capture the Flag competition (SECTF for those of you in the know). The SECTF is your chance to publicly schmooze, vish, elicit, smooth-talk, and social engineer in front of an eager audience of peers for […]
People lie. It’s a fact of life. Recently at my 10 year reunion, I overheard people say they worked in everything from medicine to engineering, when I knew that these people worked in a big box retail store occasionally moving shelves and stocking meds. My wife lies to me every time I get excited about […]
Friday, October 21st was a rough day for many on the internet. This was the day a massive DDoS attack took place against Dyn DNS; taking sites like Twitter, Amazon, New York Times, and many others off line. The day that your appliances are on the attack. With our favorite social media tools down OSINT […]
Recent headlines have thrown social engineering tactics back into the spotlight and with the election, it’s no wonder that the candidates are the primary targets of attacks. In recent months Robert Podesta, Colin Powell and the Democratic National Convention have had emails dumped to WikiLeaks by persons unknown. While many of these are attributed […]