Social-Engineer Newsletter Vol 08 – Issue 108

Information Security: How Well is it Being Used to Protect Our Children at School? August and September are ordinary months to some, but to others they are a time of mixed emotions. It’s the start of another school year. Some are sad to see their children off, while others celebrate that day. The start of the school year brings with it a lot of paperwork and sharing of sensitive information.…

Advances in Machine Learning

Back in March we talked about Adobe’s Project VoCo which could recreate someone’s speech with only twenty minutes of recorded dialogue.  Now just a few months later, Lyrebird claims it can recreate any voice with just one minute of recorded speech!  Lyrebird also says it can make that speech have any intonation or emotion, from sadness to anger.    As far as synthesizing video, students at the…

Social-Engineer Newsletter Vol 06 – Issue 85

Your Old Password Has Been Sold — So What? Data breaches are a regular occurrence. When we hear reports about one that happened with a social media site, a company, or a product we use, we will quickly change our password to that account. Reports like these: “Hacker Selling 65 Million Passwords from Tumblr Data Breach”, “Hacker Tries to Sell 427 Million Stolen MySpace Passwords”, “Hackers…

Social-Engineer Newsletter – Vol 05 Issue 67

Phishing Dark Waters — An Interview With The Authors Fishing is simple, right? You have a fishing pole, you bait the hook, and then you sit and wait. But ask someone who loves to fish, a bonafide fisherman, and they will tell you there is so much more to it: the type of fishing line, the lure, the type of bait, how you cast the line, the best location, time of day, etc. Phishing is no…

Con Man

A con man is  a person who swindles or misleads his victims through the use of a confidence game. A con man knows that it's human nature to want to trust other individuals. So, a con man manipulates this natural desire to trust others for their own personal gain. In fact, most historically infamous con men are known for their exploits involving money. Indeed, money seems to be a common thread…

Dumpster Diving

What can you find in a dumpster besides trash? While dumpster diving, you may find medical records, resumes, personal photos, emails, bank statements, account details, information about software, tech support logs, and so much more. For instance, this article reports on medical records found in a dumpster. Pittsburgh's Action News 4 Using social engineering techniques, this…

SEORG Media Archives

August 9, 2011 DefCon Kids guides young hackers to do good USAToday.com August 8, 2011 Defcon Hacking Contest Targets Big Corporations (VIDEO) HuffingtonPost.com Hacker Contest Finds Easy Prey In Big Corporations Portfolio.com Oracle loses the social engineering competition at Defcon TheInquirer.net Hacking through "social engineering" at DefCon 2011 MyBroadband.co.za…

Information Brokers

The Federal Trade Commission (FTC) defines data brokers as “companies that collect information, including personal information about consumers, from a wide variety of sources for the purpose of reselling such information to their customers for various purposes, including verifying an individual’s identity, differentiating records, marketing products, and preventing financial fraud.” Protecting…