Get to know some useful cybersecurity terminology!
Modus Operandi
Hackers and cybercriminals are often dubbed to be same nefarious character. Hackers are skilled individuals, sometimes without releasing what good they can do with their skills. But what really motivates someone to become a cybercriminal.
Disregard For Data
We used to report data concerns to companies in the most archaic manner. We became efficient and employed tools such as Spiderfoot HX to help us scale up this discovery processes. We then tried to streamline reporting and even made …
The AntiSocial Engineer Newsletter
Hello! I am Richard, the founder of The AntiSocial Engineer and I wanted to introduce the new AntiSocial Newsletter. The team and I have waited several years to release a newsletter due to the desire to really make them special. …
VPNs for Normal People
It’s been quite a week in the media for VPN providers. Two large companies have had breaches of security in some way or another and the industry dumpster fire has had a fresh poke and a few new logs chucked …
Keeping Children Safe Online
Online safety for children isn’t just a blog for us. It’s the very reason our business was founded. We had this crazy idea to help the police years ago and remove some of the burden of social engineering attacks. The …
Remember Innovative Passwords
Ben is currently studying computer science at secondary school. He is on work experience at The AntiSocial Engineer learning about the challenges businesses face when it comes to cybercrime.
Play Your Cards Right
The banks can put people off with their legal jargon and never-ending variables.
We have done the research and wanted to share the vitals on your rights to help shoppers stay safe.
Hey Siri, ruin my life
Normally we take pride in demonstrating a cutting edge social engineering technique, but as I write this article the only feeling I have is utter dismay. I am ashamed of the regulatory body. Ofcom (The Office of Communications, the UK …
Troublesome Terminology
When tasked with teaching employees about social engineering, the industry doesn’t half make it hard. People sat in marketing that have never sent a phishing email, or set foot in an office with a key-logger in their pocket chirp up …
Doorstep Data Collection
Shampoo, bubble bath and room sprays, Avon has everything you need to unwind in aromatherapy euphoria. But would you feel so relaxed knowing that your data might be vulnerable to criminals? For those who don’t know, Avon is a company …
How To Activate 2-Factor
Have you ever wondered how you activate 2-factor? This 2 minute guide will help you understand this.
All Inclusive Scams
If there is one thing that always impresses me it’s the ways scammers rotate what they do, many marketing teams could learn a thing or two by watching this. Scammers are always the first ones to exploit seasonal events. Be …
AntiSocial Blocklist – Community Version Launch
The AntiSocial Blocklist was a concept debated quickly in a passing idea, it quickly spiralled off into an obsession. The logic was obtained from working with victims of crime and our hands on experience of social engineering attacks. We know …
Looking For Fraud
Here at The AntiSocial Engineer we are always keen to identify the things that enable social engineers. The name is more than a play on words, our business is all about throwing the spanners into serious organised crime and making …
CEO Fraud: Cutting Everything Out
CEO Fraud is the catchy name for frauds that are committed by a criminal, that pretends to be the company CEO or another high-level member of staff. The internet is awash with guides about CEO Fraud, but few seem to …