Remove Book Remove InfoSec Remove Social Engineering
article thumbnail

Choose Your Own Adventure game animates security awareness training

SC Magazine

Infosec’s Choose Your Own Adventure training game “Deep Space Danger” tests employees on their knowledge of social engineering. I read a lot of Choose Your Own Adventure books and I always loved them,” Koziol continued. “As What do you do? Bore them with dull content that feels like a lecture.

article thumbnail

Acting Skills Helped Me Become a Vishing Professional

Security Through Education

I am currently a full-time social engineering pentesting professional with Social-Engineer, LLC (SECOM). The Social Engineering Framework defines vishing as the “practice of eliciting information or attempting to influence action over the telephone.” I’m not originally from the InfoSec world.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Robert Kerbeck Author of RUSE: Lying the American Dream from Hollywood to Wall Street

Security Boulevard

In this episode learn all about the world of corporate spying from someone who was a corporate spy and actually wrote a book on it! Robert Kerbeck author of “RUSE: Lying the American Dream from Hollywood to Wall Street” joins us to discuss his fascinating career as a corporate spy, life as a struggling actor, […].

article thumbnail

OSINT in 60 seconds. Mind reading on TV

Pen Test Partners

Sometimes you don’t even need this level complexity as people often provide their full name and email (and other details) when booking tickets for example. These are common con techniques and used by social engineers. This could give scammers a head start, allowing them to gather information days or weeks in advance.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. I've mentioned before but InfoSec Twitter is a valuable resource. For many, though, that isn’t true.

Hacking 40
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. I've mentioned before but InfoSec Twitter is a valuable resource. For many, though, that isn’t true.

Hacking 40
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more. How to screen for natural infosec talent: Ask for a worst case scenario for any common situation. Bruce Schneier | @schneierblog.