The Social Engineer

Human Beings: The most easily exploitable aspect of security

Birds of a Feather Flock Together

Social Engineering /

Part 1 of 2. Synchronicity People hire people like themselves. People buy from people like themselves. People date people like themselves. People like people like themselves. People are comfortable with people like themselves. “We learn our life skills through guidance and rapport with others. As we continually pick up signals from our parents, peers, teachers, …

No Detail Too Small – Intro

OSINT, Social Engineering /

What social engineer doesn’t love some good old fashion reconnaissance? As a social engineer, this initial stage of information gathering will make or break most engagements. As an Information Security Officer tasked with the job of keeping your organization safe and secure, it is important to understand just what malicious hackers are doing in order …

The Importance of the Pretext

Social Engineering /

More and more often hackers are relying on exploiting the human aspect of security to gain access to their targets through social engineering type attacks (e.g., phone, phishing, in-person, etc.). With strong firewalls, intrusion detection/prevention systems, and tools like security incident and event management (SIEM), you are seeing an increase in attacks that are targeting …