100 kostenlos singles kennenlernen xbox one berlin gay pride route chats de fuerza popular dating ab 40 rules
Blog Archives

Should we hire a Hacker….? On Trust, Diversity and Common Sense

    “Should we hire a hacker?” It may be tired but it is a question that is persistently asked in the security industry, because I guess we don’t feel we have answered it satisfactorily yet, and there is an

Tagged with: , , , ,
Posted in Social Engineering, The Deception Chronicles

On Attentiveness

One of the biggest mistakes people make in Negotiations is to lack due attentiveness throughout the procedure. Attentiveness means having a higher level of awareness of what is being said and, almost more importantly, what is not being said. I

Tagged with: , ,
Posted in Negotiation, The Deception Chronicles

The Locked Door… Do you think like a Social Engineer?

  A while ago on LinkedIn I posted the following riddle and its answer. It got lots of interaction because EVERYONE when they put their minds to it, likes to think of themselves as a Social Engineer, at least some

Tagged with: , , , ,
Posted in Social Engineering, The Deception Chronicles

In the Weeds – Social Engineering Blindness and Red Teams

A couple of years ago at a conference in Texas I heard the phrase “in the weeds.”   It means being in the sort of situation where you get so emerged in the details “the weeds” that it is hard

Tagged with: , , , , ,
Posted in Social Engineering, The Deception Chronicles

Rapunzel – Biometrics, Human Error and Social Engineering

Social Engineering, biometrics and human error are at the heart of the story of Rapunzel, along with proof that if somebody wants something badly enough they will find a way to get to it, regardless of the measures in place

Tagged with: , , , ,
Posted in The Deception Chronicles, Uncategorised

Spotting the Threat Within….

    http://www.itsecurityguru.org/2015/03/17/spotting-the-threat-within/

Tagged with: , , , , , ,
Posted in Social Engineering, The Deception Chronicles

Attacking from the Outside…

go site     http://www.itsecurityguru.org/2015/03/16/attacking-from-the-outside/

Tagged with: , ,
Posted in Social Engineering, The Deception Chronicles

Social Climbing…

  Social engineers come in many different flavours, from the disgruntled ex-employee who wants to disrupt his former employers activities, to the criminal who is looking for financial gain, to the activist who has an axe to grind with an

Tagged with: , , , , ,
Posted in Social Engineering, The Deception Chronicles

Wolf in Sheep’s Clothing – Insider threat and Social Engineering

For a hacker, sometimes the easiest way “in” to an organisation is to actually go “in.” Some businesses, such as call centres or those who use many contract workers, or those with complex and extended supply chains, or those who

Tagged with: , , , , ,
Posted in The Deception Chronicles, Uncategorised
| Website designed & hosted by Cyberfrog Design