Romance scams rank #1 in total consumer fraud losses affecting Americans. In this Newsletter we explore the history of online relationships and provide tips to keep you safe from scammers.
The Social-Engineer Newsletter
The Social-Engineer Newsletter is a monthly journal that covers the physical, psychological or physiological principles of social engineering that apply to everyday life. Subscribe to receive the newsletter via email on the FIRST MONDAY of each month; or browse our newsletter archives below.
In this issue: “Back to School: Education Through Security.” With data breaches happening almost every day and the dangers that lurk online, back to school season can be overwhelming. Protecting ourselves and our children needs to be a priority.
In this issue: “The CEO/BEC Scam: How Criminals Target Emotions”. According to the 2019 Verizon Data Breach Investigations Report (DBIR) 33% of confirmed data breaches were the result of social attacks. For each statistic, there is a person and a story. Our goal this month is to shine a spotlight on the mental and emotional distress victims of social attacks experience.
In this issue: “SE Village — 10 Years in Review.” The SEVillage is the epicenter for all things social engineering. On this 10 year anniversary we review everything that has been accomplished.
In this issue: “Charity Scams are Real – How Low Will They Go to Exploit a Tragedy?” Find out how cyber criminals monetize tragedy and exploit human emotions.
In this issue: “A Beginner’s Insight Into Vishing.” How can someone become a successful visher? Social-Engineer recently hired two team members who have been accumulating tremendous success. We interviewed them and we are sharing their insights with you in this newsletter.
In this issue: “A Path to Social Engineering.” What can introverts do to learn to be successful social engineers? Find out how one introvert made the journey and the lessons he learned on the way.
In this issue: “Smile, Facial Recognition in Use.” Facial recognition software has been growing in popularity with companies and government agencies throughout the world. Can this technology be easily circumvented and used maliciously through social engineering techniques?