Stealing Credentials via Social Engineering

Social-Engineer.org receives a lot of submissions from people who have an interest in social engineering, deception, identity theft, information gathering and the rest of what makes up a true social engineer. Recently a social-engineer.org fan, Khash, wrote a very interesting paper/story on credential stealing. We hope you enjoy it as much as we did and please keep sending your submissions in to…

Episode 008 – The Social Engineering Zero Day Revealed

https://www.youtube.com/watch?v=ba2rqxJeYS8 The information contained in this podcast is some of the most mind blowing we have ever released. An intimate talk with an anonymous person who has detailed knowledge of how to perform identity theft and the very tricks that real identity thieves use to do their bad deeds. He outlines, details and shows how these attacks are performed then talks with…

iPads and Social Engineering – Is it “Magical”?

Today the iPad was delivered to hundreds of thousands of expecting users.  Along with that, the Internet is a buzz with iPad news, iPad Apps, iPad reviews and iPad Social Engineering... Soon as Apple launched the news that the iPad was going public Apple related spam increased by 30%.  While most of these are spam, many are luring people who desire an iPad to sites that "promise" to put you at…

Will Social Engineering Become the Biggest Risk?

We have been collecting interesting articles and stories from around the Internet that have to do with Social Engineering. This is the start of a blog thread devoted to these stories and what we can learn from them. Sometimes they will be just funny stories that show how easy it is to trick people and other times there will be some great information for us to delve into. Our first official…

The Web’s Official Resource on Influence, Deception and Phishing Prevention – social-engineer.org

Social Engineering has a bad reputation with the multitude of sites devoted to "How to lie," "How to get this or that free," and "How to defraud people."  We wanted a place where professional, security-minded industry experts can share ideas, tools and just have conversations that are "above board."  We wanted to create a place where professional social engineers can meet and share information…

Understanding SMiShing

In the digital age, as our reliance on technology deepens, so does the creativity of malicious actors seeking to exploit vulnerabilities. One of the many growing threats to our security is SMiShing, a blend of SMS (Short Message Service) and phishing. SMiShing attacks utilize text messages to deceive individuals into divulging sensitive information or performing actions that compromise their…

Emotions Used in Human Hacking

  The COVID-19 pandemic has changed the way we live in many ways. In response to the pandemic, many businesses have implemented remote workforces. As a result, millions of Americans now work from home instead of their place of employment. This rapid shift has increased the vulnerability of many organizations. According to Forbes, Cyber intelligence firm CYFIRMA revealed cyberthreats…

Don’t Overlook the Human Element in Security Training and Awareness

Security training and awareness must focus on risk scenarios that include the human element. The is especially so in light of the 2017  Verizon’s Data Breach Digest report that 90 percent of data-loss incidents have a phishing or social engineering component. The cost of a data breach for both large and small to medium-size enterprises continues to rise. In addition to the financial loss there…