Blog Archives

In the Weeds – Social Engineering Blindness and Red Teams

A couple of years ago at a conference in Texas I heard the phrase “in the weeds.”   It means being in the sort of situation where you get so emerged in the details “the weeds” that it is hard

Tagged with: , , , , ,
Posted in Social Engineering, The Deception Chronicles

The Enemy of Good – Thoughts on productivity

I was recently reminded of the saying “perfect is the enemy of good”and this got me thinking about personal demons and the things that block our creativity, productivity and ability to meet our goals. Years ago I worked for a

Tagged with:
Posted in Business, The Deception Chronicles

InfoSec 2015 Interview

Tagged with: , , , , ,
Posted in Social Engineering, The Deception Chronicles, Uncategorised

Rapunzel – Biometrics, Human Error and Social Engineering

Social Engineering, biometrics and human error are at the heart of the story of Rapunzel, along with proof that if somebody wants something badly enough they will find a way to get to it, regardless of the measures in place

Tagged with: , , , ,
Posted in The Deception Chronicles, Uncategorised

Spotting the Threat Within….

    http://www.itsecurityguru.org/2015/03/17/spotting-the-threat-within/

Tagged with: , , , , , ,
Posted in Social Engineering, The Deception Chronicles

Attacking from the Outside…

    http://www.itsecurityguru.org/2015/03/16/attacking-from-the-outside/

Tagged with: , ,
Posted in Social Engineering, The Deception Chronicles

Lessons from the Big Four – Shakespeare’s Tragic Heroes

  I don’t know if the phrase “the bigger they come, the harder they fall” was around when Shakespeare was alive but it applies to his tragic heroes across the board. If we look at his BIG FOUR, Hamlet, Macbeth,

Posted in Social Engineering, The Deception Chronicles

Social Climbing…

  Social engineers come in many different flavours, from the disgruntled ex-employee who wants to disrupt his former employers activities, to the criminal who is looking for financial gain, to the activist who has an axe to grind with an

Tagged with: , , , , ,
Posted in Social Engineering, The Deception Chronicles

Wolf in Sheep’s Clothing – Insider threat and Social Engineering

For a hacker, sometimes the easiest way “in” to an organisation is to actually go “in.” Some businesses, such as call centres or those who use many contract workers, or those with complex and extended supply chains, or those who

Tagged with: , , , , ,
Posted in The Deception Chronicles, Uncategorised

TEDX Liverpool – Surrounded by Lies

https://youtu.be/h0kgB9S_O6Y?list=PLCNN_qZrFLnKShMRbSxtn0rD5FYLfldDJ

Tagged with: , , , , , , ,
Posted in Business, Negotiation, Real life, Social Engineering, The Deception Chronicles
| PRIVACY AND COOKIE POLICY | Website designed & hosted by Cyberfrog Design