Over one year ago a reporter reached out to us with a crazy idea, he said, “I want you to hack me… no holds barred. Gloves off. And I want to get it on film….” How did those events affect him? Find out as Kevin Roose joins us on the SEPodcast April 11, 2016 Contents […]
Content tagged: vulnerability
Social-Engineer.org today announced the release of the Social Engineer Capture the Flag Report, collecting data from the fifth Social Engineer Capture the Flag (SECTF) contest, held at DEF CON 21. During one of the most prominent and popular annual events at DEF CON, a pool of 10 men and 10 women, from diverse backgrounds and experience levels, […]
In This Issue: “Can Sylvester Stallone Predict the Future?” Remember the scene in the Demolition Man where the villain holds a meeting and all attendees are connected by telepresence? Could future work environments be completely virtual? What implications might this have for the social engineer?
The Onion, the Internet’s favorite parody news site, was recently the victim of a hack that compromised their corporate Google Accounts as well as their Twitter accounts.
How have the Chinese been so successful at ravaging U.S. government and corporate secrets? The answer, according to Mandiant, is Social Engineering.
The whole reason I decided to tell this story is that while I may not have had malicious intent towards my Country’s Armed Forces, what if someone who did have malicious intent, got or gets in the future, the same type of access that I have had? What if I did nothing to help fix the problem?
Multi-tiered social engineering attacks are growing in popularity and being executed with devastating results.
an Australian man dressed in a all too short cassock, fake cross and using a scarf as a purple sash managed to sneak past the Swiss Guards and into the Vatican.