The banks can put people off with their legal jargon and never-ending variables.
We have done the research and wanted to share the vitals on your rights to help shoppers stay safe.
Hey Siri, ruin my life
Normally we take pride in demonstrating a cutting edge social engineering technique, but as I write this article the only feeling I have is utter dismay. I am ashamed of the regulatory body. Ofcom (The Office of Communications, the UK …
Troublesome Terminology
When tasked with teaching employees about social engineering, the industry doesn’t half make it hard. People sat in marketing that have never sent a phishing email, or set foot in an office with a key-logger in their pocket chirp up …
Doorstep Data Collection
Shampoo, bubble bath and room sprays, Avon has everything you need to unwind in aromatherapy euphoria. But would you feel so relaxed knowing that your data might be vulnerable to criminals? For those who don’t know, Avon is a company …
How To Activate 2-Factor
Have you ever wondered how you activate 2-factor? This 2 minute guide will help you understand this.
All Inclusive Scams
If there is one thing that always impresses me it’s the ways scammers rotate what they do, many marketing teams could learn a thing or two by watching this. Scammers are always the first ones to exploit seasonal events. Be …
AntiSocial Blocklist – Community Version Launch
The AntiSocial Blocklist was a concept debated quickly in a passing idea, it quickly spiralled off into an obsession. The logic was obtained from working with victims of crime and our hands on experience of social engineering attacks. We know …
Looking For Fraud
Here at The AntiSocial Engineer we are always keen to identify the things that enable social engineers. The name is more than a play on words, our business is all about throwing the spanners into serious organised crime and making …
CEO Fraud: Cutting Everything Out
CEO Fraud is the catchy name for frauds that are committed by a criminal, that pretends to be the company CEO or another high-level member of staff. The internet is awash with guides about CEO Fraud, but few seem to …
Twitter is Broken
Twitter by SMS So let’s get the boring stuff out the way! if you have a phone number connected to your Twitter account you can SMS Twitter and do social media stuff via SMS message. An SMS of ‘RT @Twitter’ …
The AntiSocial AntiGrinch Giveaway
Because it’s Christmas we thought it would be good if we could give back and try to get five six lucky families using a secure password manager – like 1Password. We want to give lucky winners a voucher to start their family …
Diamonds and Dirt
I quite like diamonds. Not for their look but for the whole backstory on why they are so desired today. The De Beers ‘cartel’, amongst others, inflated the price of diamonds since the 1800s. Around 1938 the De Beers diamond group …
Layered Learning
In our bubble of InfoSec, we can find ourselves feeling like we are fighting a loosing battle. We write perfect policies – that nobody reads and after your 5th security incident you can feel like you are bashing your head …
Cybersecurity Leadership Summit 2018 Europe
We had the pleasure of attending the Cybersecurity Leadership Summit 2018 Europe in Berlin and thought it would be a good idea to capture some of the event and hopefully pass on some of the conference for people who did …
Argos Doesn’t Take Care of IT
So recently I needed a computer monitor in a hurry, I was in the north and I wanted a monitor to be collected by a colleague in the south. My mind pondered several next day options but then it hit …
The Romance Scam
There was a simpler time where people would send post cards asking for pen-friends. A friendship slowly developed and they would ask for a small amount of money. With the advent of the internet all this changed though, scammers could …
Some AntiSocial Password Advice
Advice on passwords is getting out of hand. Just round and round in the echo chamber of infosec with our highly subjective opinions. It serves only to confuse users and does little to actually change the habits we see around password …
Blueteam Tools In My Toolbox
From the very start of being interested in ‘hacking’ and Information Security I do wonder what influences the style, the culture… I mean we all love InfoSec redteams and the ways for a brief moment our minds provide us with …
Trivial Mistakes On Trello
Open Source Intelligence (OSINT) is the practice of using publicly available data about a target company or person. In our field of work it’s critical because it gives you all the juicy details you can later turn into a pretext. …
Sim Swap Fraud – A Victim’s Perspective
For many victims of SIM Swap Fraud, the first time they learn about the attack is in the hours after their life has been changed forever. It’s an all too common story, the signal bars disappear from your mobile phone, …