Remove Book Remove InfoSec Remove Social Engineering
article thumbnail

Choose Your Own Adventure game animates security awareness training

SC Magazine

Infosec’s Choose Your Own Adventure training game “Deep Space Danger” tests employees on their knowledge of social engineering. I read a lot of Choose Your Own Adventure books and I always loved them,” Koziol continued. “As What do you do? Bore them with dull content that feels like a lecture.

article thumbnail

Cyber Pearl Harbor Is Happening Right Now — It’s Ransomware

Daniel Miessler

Since 2007 the InfoSec industry has been talking about TheBigOne™—the event that would change cyber threats from annoyances to existential concerns. They called it Cyber Pearl Harbor. This doesn’t mean it can’t still happen. Nowhere near fast enough.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Acting Skills Helped Me Become a Vishing Professional

Security Through Education

I am currently a full-time social engineering pentesting professional with Social-Engineer, LLC (SECOM). The Social Engineering Framework defines vishing as the “practice of eliciting information or attempting to influence action over the telephone.” I’m not originally from the InfoSec world.

article thumbnail

The bad old days

Javvad Malik

We only had Infosec Europe and the most we got out of there was some free USB sticks… If we were lucky they would be 500 megs. It’s so easy to manipulate anyone that works in infosec. Forget complex social engineering techniques – just go up to a guy, and ask him if he’s been working out?

Passwords 113
article thumbnail

Robert Kerbeck Author of RUSE: Lying the American Dream from Hollywood to Wall Street

Security Boulevard

In this episode learn all about the world of corporate spying from someone who was a corporate spy and actually wrote a book on it! Robert Kerbeck author of “RUSE: Lying the American Dream from Hollywood to Wall Street” joins us to discuss his fascinating career as a corporate spy, life as a struggling actor, […].

article thumbnail

OSINT in 60 seconds. Mind reading on TV

Pen Test Partners

Sometimes you don’t even need this level complexity as people often provide their full name and email (and other details) when booking tickets for example. These are common con techniques and used by social engineers. This could give scammers a head start, allowing them to gather information days or weeks in advance.

Scams 81
article thumbnail

The Hacker Mind Podcast: So You Want To Be A Pentester

ForAllSecure

In a few minutes I’m going to talk to a pentester who’s written a book that can help take your current skills as a sys admin and security engineer and turn them into skills needed to become a great digital pentester. She is an impressive force within the infosec world. available wherever books are sold.