Go back about 15 years and if you and I were sitting over a whisky having a chat I would never have imagined that social engineering would be where it is today. When I started this company and began writing
The Social-Engineer Newsletter
The Social-Engineer Newsletter is a monthly journal that covers the physical, psychological or physiological principles of social engineering that apply to everyday life. Subscribe to receive the newsletter via email on the FIRST MONDAY of each month; or browse our newsletter archives below.
Studies have shown that uncommon names can have a negative effect. Are they right? Maxie Reynolds, Technical Team Lead for Social-Engineer, LLC, takes a look.
Shelby Dacko, Human Risk Analyst with Social‐Engineer, LLC., shares her story of entering the field of professional social engineering.
Whether it’s protecting your personal network and devices, your virtual workspace, or classroom, find out how you can #BeCyberSmart.
From Fortune 500 companies, to kids and retirees, and everyone in between, we are all potential targets of social engineers. In this newsletter we examine social engineering tactics, how they are used against us, and how we can all identify them to our benefit.
Being a hacker requires curiosity, certain computer security skills, and a mindset for figuring out what criminals will do before they do it. So, where do we look for the next generation of hackers? Find out in the August Newsletter!
Have you ever tried to pretend you’re someone else to get the deal to go through? If you have, then you’ve used the social engineering technique of impersonation. Is it helpful? Can we effectively blend social engineering with sales and ethics? Find out in the July Newsletter.
Did you ever receive an email with that subject line IILOVEYOU? Millions did in May 2000. It was a game changer for social engineering, and saw the beginning of the rise of phishing attacks. Social engineering and cybersecurity have come a long way since 2000. This month, we’re going back to the past and taking a look at social engineering to see how far it has come.