Social Engineering the Classroom

There are those who loved school and those who, like Ferris Bueller, loved getting out of school. However, SEORG is…

Read More

What comes after the huffing and puffing?

In the midst of all the recent articles about information breaches, it’s important to focus on how to spot such tactics…

Read More

Friends Don’t Send Friends Malware on Facebook

Friends Don’t Send Friends Malware on Facebook. Spread the word! Let that guy you bought coffee from know that friends…

Read More

What damage does social engineering really cause anyway?

What damage does social engineering cause? To give you an idea, we’ve put together a list of some of the hacks in 2014…

Read More

DEF CON 25 SECTF Rules and Registration

This truly unique event will challenge and test your social engineering skills. During the SECTF at DEF CON each…

Read More

Implicit Bias – Chances Are, You Have One

Implicit Bias – Chances Are, You Have One. As social engineers, being aware of your implicit biases will give you…

Read More

Let’s Go Vishing

Vishing, or eliciting information over the phone, is a common social attack vector. It’s proven to be one of the most…

Read More

Post-Cyber Monday survival

Start a new tradition: Post-Cyber Monday survival. We've compiled a checklist of six simple steps for securing your…

Read More

Danger: Dopamine Addiction

People like to be appreciated and know they are good at what they do. This goes for social engineering pentesters, too.…

Read More

THE SOCIAL ENGINEERING CAPTURE THE FLAG ROUNDUP

As sophisticated, targeted attacks become increasingly prevalent, today’s organizations are being challenged, now more…

Read More