Subliminal Hacking
The Art and Science of Social Engineering


 
Posts Tagged ‘spotlight’
 

 

91% Of All Attacks Attributable to Spear Phishing … Infograph by ProofPoint

I just received an email from Proofpoint, and its another one of their great Infographs. This is a great Infograph re-enforcing the fact that it only takes a single breach for the cost to be significant. Not surprisingly the in...
by Dale Pearson
1

 
 

Playing Nicely with Scammers … Wasting their time for giggles :)

So I am in the business of social engineering people (with authorisation of course), and depending on who you speak to this could be interpreted as scamming, conning, or generally straight up manipulation. The reason I do this ...
by Dale Pearson
15

 
 

The Risks of Posting in Social Networks … By Trend Micro

I found this awesome Infograph put together by Trend Micro on the Risks o Posting in Social Networks. I cant remember exactly where I found it now but I saved the image so I am posting it here. If you know where it came from fe...
by Dale Pearson
1

 

 

Faking It To Make It … Fake Data Generation Recommendations List

Depending on your history and how you got into InfoSec you may or may not of been exposed to the world of developer testing, if you did I am sure you have many unhappy memories of arguing why “real” data should not ...
by Dale Pearson
1

 
 

Tweaking your Critical Factor … Understanding RAS

In previous posts (probably over a year ago now) I have spoken about this thing called the critical factor. In the hypnosis world this is the gatekeeper or firewall between your conscious and subconscious mind, helping to kee...
by Dale Pearson
1