email flirthookup click bart spencer swinger club deutsch online dating anschreiben over 50
Blog Archives

Should we hire a Hacker….? On Trust, Diversity and Common Sense

go     “Should we hire a hacker?” It may be tired but it is a question that is persistently asked in the security industry, because I guess we don’t feel we have answered it satisfactorily yet, and there is an

Tagged with: , , , ,
Posted in Social Engineering, The Deception Chronicles

Peacocks, GURUs and Advice

go Peacocks are a particularly daft bird. They are all mouth and pretty feathers but an absolute pain in the neck to be around, (apologies to peacock lovers everywhere.) I don’t really hate peacocks but their less than admirable qualities do

source url

Tagged with:
Posted in Social Engineering, The Deception Chronicles, Uncategorised

The Locked Door… Do you think like a Social Engineer?

  A while ago on LinkedIn I posted the following riddle and its answer. It got lots of interaction because EVERYONE when they put their minds to it, likes to think of themselves as a Social Engineer, at least some

source site

Tagged with: , , , ,
Posted in Social Engineering, The Deception Chronicles

Getting past Conference Security – Do you think like a Social Engineer

A while ago, I was speaking at a conference in the north of England. I wasn’t especially enamoured of the topic and was doing it as a favour for the organiser who was an old friend. I wasn’t “on” until

follow site

Tagged with: , , ,
Posted in Social Engineering, The Deception Chronicles

In the Weeds – Social Engineering Blindness and Red Teams

A couple of years ago at a conference in Texas I heard the phrase “in the weeds.”   It means being in the sort of situation where you get so emerged in the details “the weeds” that it is hard

here

Tagged with: , , , , ,
Posted in Social Engineering, The Deception Chronicles

InfoSec 2015 Interview

Tagged with: , , , , ,
Posted in Social Engineering, The Deception Chronicles, Uncategorised

Spotting the Threat Within….

    http://www.itsecurityguru.org/2015/03/17/spotting-the-threat-within/

Tagged with: , , , , , ,
Posted in Social Engineering, The Deception Chronicles

Attacking from the Outside…

    http://www.itsecurityguru.org/2015/03/16/attacking-from-the-outside/

Tagged with: , ,
Posted in Social Engineering, The Deception Chronicles

Lessons from the Big Four – Shakespeare’s Tragic Heroes

  I don’t know if the phrase “the bigger they come, the harder they fall” was around when Shakespeare was alive but it applies to his tragic heroes across the board. If we look at his BIG FOUR, Hamlet, Macbeth,

Posted in Social Engineering, The Deception Chronicles

Social Climbing…

  Social engineers come in many different flavours, from the disgruntled ex-employee who wants to disrupt his former employers activities, to the criminal who is looking for financial gain, to the activist who has an axe to grind with an

Tagged with: , , , , ,
Posted in Social Engineering, The Deception Chronicles
| Website designed & hosted by Cyberfrog Design