May 19, 2015
Social Engineering the Classroom
There are those who loved school and those who, like Ferris Bueller, loved getting out of school. However, SEORG is…
April 20, 2015
What comes after the huffing and puffing?
In the midst of all the recent articles about information breaches, it’s important to focus on how to spot such tactics…
March 23, 2015
Friends Don’t Send Friends Malware on Facebook
Friends Don’t Send Friends Malware on Facebook. Spread the word! Let that guy you bought coffee from know that friends…
March 5, 2015
What damage does social engineering really cause anyway?
What damage does social engineering cause? To give you an idea, we’ve put together a list of some of the hacks in 2014…
February 6, 2015
DEF CON 25 SECTF Rules and Registration
This truly unique event will challenge and test your social engineering skills. During the SECTF at DEF CON each…
February 5, 2015
Implicit Bias – Chances Are, You Have One
Implicit Bias – Chances Are, You Have One. As social engineers, being aware of your implicit biases will give you…
December 22, 2014
Let’s Go Vishing
Vishing, or eliciting information over the phone, is a common social attack vector. It’s proven to be one of the most…
December 2, 2014
Post-Cyber Monday survival
Start a new tradition: Post-Cyber Monday survival. We've compiled a checklist of six simple steps for securing your…
November 13, 2014
Danger: Dopamine Addiction
People like to be appreciated and know they are good at what they do. This goes for social engineering pentesters, too.…
October 30, 2014
THE SOCIAL ENGINEERING CAPTURE THE FLAG ROUNDUP
As sophisticated, targeted attacks become increasingly prevalent, today’s organizations are being challenged, now more…