Have you locked down your accounts? Malicious attackers are searching for information on social media platforms such as Facebook and LinkedIn. Find out what we can learn from Cobalt Gypsy’s created persona ‘Mia Ash’.
The Social-Engineer Blog
The Social-Engineer Blog is an informational post that is designed to keep our readers up-to-date with current SE news involving relevant science, research, and studies. It also reports on SE attacks with tips on staying safe, as well as funny stories that are related to SE.
2017 proved to be a huge year for Social-Engineer. Complete with two SE Capture the Flags. This means our report this year is compiled from data from both of the SECTF’s. Download a copy of the report now and sign up for a free webinar.
Back in March we talked about Adobe’s Project VoCo which could recreate someone’s speech with only twenty minutes of recorded dialogue. Now just a few months later, Lyrebird claims it can recreate any voice with just one minute of recorded speech!
Relive all the amazing moments we had at DEF CON 25! Get all the details about our three SECTF competitions and so much more!
Web beacons embedded in pages and emails can be used as reconnaissance tools for social engineering attacks. We’ve got tips and tools to minimize your exposure.
Both Fitbits and smartphones have Micro electro-mechanical systems (MEMS) accelerometers. Is there potential for misuse in a social engineering?
Yes, you have read this correctly. This year in the SEVillage at DerbyCon, Social-Engineer will be holding its first ever Social Engineering Capture The Flag event at DerbyCon!
Headlines abound with stories of children hacking websites. How can you teach your kids to be safe and responsible online? We’ve got tips on how to help them learn skills without regrets.