In This Issue: “How Being Vulnerable in Security isn’t Always a Bad Thing.” As a social engineer, how do we protect people and still trust people ourselves? How do we balance building relationships quickly for engagements, and building real relationships in our lives?
Content tagged: pretext
How does one get into the CIA? Find out how a poem and a few jokes landed Emily Brandwin in a life of espionage.
In This Issue: “Please Don’t Put Words in My Mouth.” Recently Adobe announced Project VoCo. Basically, it’s Photoshop for audio. In this month’s newsletter find out how bad actors could potentially use this and how to minimize the risk of falling victim.
In This Issue: “Are You Enjoying Your Trip As Much As the Social Engineer Is?” It’s become standard business etiquette to set automatic out-of-office email replies to respond in your absence. Sharing vital information can be important to keep things running smoothly while you’re away. However, it can also be used to launch an attack. In this newsletter we provide tips to keep your organization safe.
There are a variety of physical methods for information gathering. Some require very little equipment and others require high-tech gear. The one thing these methods have in common is that they can not be done from a remote location. You have to be on-site and in-person. This means that pretexting, the principles of influence, and […]
In This Issue: “Gaining Access – A New Way of Thinking at APSE.” Get an inside look into the 5 day APSE course designed and written by Chris Hadnagy.
We define impersonation as the “practice of pretexting as another person with the goal of obtaining information or access to a person, company, or computer system.” Two common attack vectors we will discuss here are impersonating a delivery person or tech support. NOTICE: This information should never be used to perform illegal acts! We discuss […]