Blog Archives

Should we hire a Hacker….? On Trust, Diversity and Common Sense

    “Should we hire a hacker?” It may be tired but it is a question that is persistently asked in the security industry, because I guess we don’t feel we have answered it satisfactorily yet, and there is an

Tagged with: , , , ,
Posted in Social Engineering, The Deception Chronicles

The Locked Door… Do you think like a Social Engineer?

  A while ago on LinkedIn I posted the following riddle and its answer. It got lots of interaction because EVERYONE when they put their minds to it, likes to think of themselves as a Social Engineer, at least some

Tagged with: , , , ,
Posted in Social Engineering, The Deception Chronicles

Getting past Conference Security – Do you think like a Social Engineer

A while ago, I was speaking at a conference in the north of England. I wasn’t especially enamoured of the topic and was doing it as a favour for the organiser who was an old friend. I wasn’t “on” until

Tagged with: , , ,
Posted in Social Engineering, The Deception Chronicles

In the Weeds – Social Engineering Blindness and Red Teams

A couple of years ago at a conference in Texas I heard the phrase “in the weeds.”   It means being in the sort of situation where you get so emerged in the details “the weeds” that it is hard

Tagged with: , , , , ,
Posted in Social Engineering, The Deception Chronicles

InfoSec 2015 Interview

Tagged with: , , , , ,
Posted in Social Engineering, The Deception Chronicles, Uncategorised

Rapunzel – Biometrics, Human Error and Social Engineering

Social Engineering, biometrics and human error are at the heart of the story of Rapunzel, along with proof that if somebody wants something badly enough they will find a way to get to it, regardless of the measures in place

Tagged with: , , , ,
Posted in The Deception Chronicles, Uncategorised

Spotting the Threat Within….

    http://www.itsecurityguru.org/2015/03/17/spotting-the-threat-within/

Tagged with: , , , , , ,
Posted in Social Engineering, The Deception Chronicles

Social Climbing…

  Social engineers come in many different flavours, from the disgruntled ex-employee who wants to disrupt his former employers activities, to the criminal who is looking for financial gain, to the activist who has an axe to grind with an

Tagged with: , , , , ,
Posted in Social Engineering, The Deception Chronicles

Wolf in Sheep’s Clothing – Insider threat and Social Engineering

For a hacker, sometimes the easiest way “in” to an organisation is to actually go “in.” Some businesses, such as call centres or those who use many contract workers, or those with complex and extended supply chains, or those who

Tagged with: , , , , ,
Posted in The Deception Chronicles, Uncategorised

TEDX Liverpool – Surrounded by Lies

https://youtu.be/h0kgB9S_O6Y?list=PLCNN_qZrFLnKShMRbSxtn0rD5FYLfldDJ

Tagged with: , , , , , , ,
Posted in Business, Negotiation, Real life, Social Engineering, The Deception Chronicles
| PRIVACY AND COOKIE POLICY | Website designed & hosted by Cyberfrog Design