In This Issue: “Charity Scams are Real – How Low Will They Go to Exploit a Tragedy?” Find out how cyber criminals monetize tragedy and exploit human emotions.
Search by Tag:body language Cat Murdock Chris Hadnagy critical thinking CTF Dave Kennedy David Kennedy deception DEFCON DEF CON ekman elicitation exploit fincher hacking Hadnagy how-to impersonation influence information gathering malicious Michele Fincher nonverbal OSINT phishing ping look podcast pretext rapport research Robin Dreeke SE attack SE awareness sectf SECTF4KIDS Security Awareness SE in daily life SE skills SEvillage social engineer Social Engineering social media spear phishing vishing vulnerability
Search results for: social media
In This Issue: “Smile, Facial Recognition in Use.” Facial recognition software has been growing in popularity with companies and government agencies throughout the world. Can this technology be easily circumvented and used maliciously through social engineering techniques?
In This Issue: “Train as a Social Engineer: The Value of Creating Environments.” Find out how creating the right environments will help you learn and develop your SE skills.
In This Issue: “Hi, It’s Your Bank Calling.” You receive a call and it’s a local number or it’s the phone number of your bank, should you answer it or let go to voicemail?
In This Issue: “Teach Early, Teach Often: Cybersecurity Education for Children.” This month marks the 15 year anniversary of Cybersecurity Awareness Month in the United States, and it is an important time to remember the systems we protect as well as the social systems that affect them.
In This Issue: “Information Security, How Well is it Being Used to Protect Our Children at School?” August and September are ordinary months to some, but to others they are a time of mixed emotions. It’s the start of another school year. Find out what can be done to protect the PII of your children.
The Social Engineering Code of Ethics accomplishes three important goals: It promotes professionalism in the industry, It establishes ethics and policies that dictate how to be a professional SE, and It provides guidance on how to conduct a social engineering business. Leave Them Feeling Better For Having Met You Chris Hadnagy, CEO of Social-Engineer, LLC […]
In This Issue: “Two-Factor or Not Two-Factor? Why is This a Question?” How does 2FA relate to social engineering? Ryan MacDougall investigates this topic and presents his findings.