Insider Threats – Recognize and Respond to the Risk Within

Malicious insiders with privileged access create significant risk. Don't ignore insider threats. Learn to recognize and…

Read More

SEVillage at DEF CON 26 Launches Sign Ups

It is that time of year again – DEF CON is only a mere 7 months away. It is time to start setting up for the SECTF and…

Read More

SECTF 8 YEARS IN REVIEW (2010-2017)

Social-Engineer.org (SEORG) has been hosting the SECTF event for the past eight years. Join us as we look back and…

Read More

Social Media – Don’t Get Burned By Overexposure

Have you locked down your accounts? Malicious attackers are searching for information on social media platforms such…

Read More

The 2017 SECTF Report

2017 proved to be a huge year for Social-Engineer. Complete with two SE Capture the Flags. This means our report this…

Read More

Advances in Machine Learning

Back in March we talked about Adobe’s Project VoCo which could recreate someone’s speech with only twenty minutes of…

Read More

DEF CON 25: The SEVillage Wrap-Up

Relive all the amazing moments we had at DEF CON 25! Get all the details about our three SECTF competitions and so much…

Read More

Web Beacons for Social Engineering Reconnaissance

Web beacons embedded in pages and emails can be used as reconnaissance tools for social engineering attacks. We've got…

Read More

Researchers Use Sound Waves to control a Smartphone (seriously) and a Car (theoretically)

Both Fitbits and smartphones have Micro electro-mechanical systems (MEMS) accelerometers. Is there potential for misuse…

Read More