In This Issue: “The Path to Becoming a Resourceful Social Engineer.” Planning, perspective taking, and creativity. Three steps that will get you on the path to becoming a resourceful social engineer.
Content tagged: phishing
Phishing is the number one security threat to organizations around the globe. Yet only a fraction of the companies that control our services, infrastructure and resources are educating their people how to combat this threat. Why? Lets discuss with Mark Chapman…. Oct 12, 2015 Contents Download Get Involved
In This Issue: “Lessons from SE Attacks in the Wild.” What can we learn about social engineering from XCode Ghost, the VW diesel dupe, and People’s Security? Read on….
Another amazing year at DEF CON and the women have again dominated the SECTF. Join us with our first and second place winners, Jen and Jon, to discuss strategy and how to win…. Sept 14, 2015 Contents Download Get Involved
First and foremost, it’s important to have a policy on how you want individuals to respond to suspicious activity whether it be on-site, over the phone, or on the computer. The next step is to make sure policies have been clearly communicated. It’s also important to openly reward the individuals who follow them and have […]
Phishing is recognized as one of the biggest cybercrime threats facing organizations and individuals today. According to Verizon’s 2019 Data Breach Investigations Report (DBIR), of the 2,013 confirmed data breaches, 32% included phishing attacks. We define phishing as the “practice of sending emails appearing to be from reputable sources with the goal of influencing or […]
In This Issue: “Trust But Verify.” Malicious social engineers have evolved along with technology and continue to exploit the trust of human networks. Find out how to keep your organization as safe as possible.
There are a variety of technical methods for information gathering. Some methods require high-tech equipment and in other situations low-tech options will work. No one source of information is the leading method to use, nor is one method alone likely to give you enough data for the compromise. When preparing for a penetration test utilize […]