February 15, 2018
Insider Threats – Recognize and Respond to the Risk Within
Malicious insiders with privileged access create significant risk. Don't ignore insider threats. Learn to recognize and…
February 13, 2018
SEVillage at DEF CON 26 Launches Sign Ups
It is that time of year again – DEF CON is only a mere 7 months away. It is time to start setting up for the SECTF and…
January 3, 2018
SECTF 8 YEARS IN REVIEW (2010-2017)
Social-Engineer.org (SEORG) has been hosting the SECTF event for the past eight years. Join us as we look back and…
November 30, 2017
Social Media – Don’t Get Burned By Overexposure
Have you locked down your accounts? Malicious attackers are searching for information on social media platforms such…
November 27, 2017
The 2017 SECTF Report
2017 proved to be a huge year for Social-Engineer. Complete with two SE Capture the Flags. This means our report this…
August 24, 2017
Advances in Machine Learning
Back in March we talked about Adobe’s Project VoCo which could recreate someone’s speech with only twenty minutes of…
August 15, 2017
DEF CON 25: The SEVillage Wrap-Up
Relive all the amazing moments we had at DEF CON 25! Get all the details about our three SECTF competitions and so much…
July 12, 2017
Web Beacons for Social Engineering Reconnaissance
Web beacons embedded in pages and emails can be used as reconnaissance tools for social engineering attacks. We've got…
June 22, 2017
Researchers Use Sound Waves to control a Smartphone (seriously) and a Car (theoretically)
Both Fitbits and smartphones have Micro electro-mechanical systems (MEMS) accelerometers. Is there potential for misuse…