How I Won The Defcon Social Engineering CTF

As the contestants for the Social-Engineer.Org SECTF at Defcon 19 are underway, we want to give a little help. Our…

Read More

Influence With Out Deception – Possible?

hey presented the question, "Is it possible to influence someone to take an action not with in their best interest with…

Read More

Microexpressions – A Key to Studying Human Behavior

Microexpressions are valuable for social engineers. Being able to read and decipher microexpressions is an essential…

Read More

Creepy Tools for Social Engineers and Information Gathering

Creepy is a geolocation tool that helps social engineers perform successful information gathering.

Read More

The Schmooze Strikes Back

In our continued efforts to raise awareness - Social-Engineer.org is proud to announce the Defcon 19 Social Engineering…

Read More

Etsy – You Are What You Buy

I would be willing to guess that most of the users who are on that site do not want anyone knowing this level of…

Read More

Social Engineer The Book Reviewed on Slashdot

Just a little bit ago I was linked to a review done by a gentlemen named, Ben Rothke. Ben wrote a really nice and very…

Read More

Social Engineering Poll – January 2011 Results

This month we asked what steps you take to protect against social engineering. We were curious if we could find any…

Read More

What A Social Engineer Can Learn from SourceCon

This whole event taught me that branching out to whole another field has taught me a lot of social engineering. I…

Read More

Is SE The Worst Security Threat?

Last month we asked you to tell us if you think Social Engineering is the worst security threat to corporations.

Read More