In some countries, being a scammer is as legitimate a profession as being a nurse or a teacher. When jobs are sparse and education is out of reach of many, often people are forced to put morals aside in order …
A Month Of Cyber Security Lessons
Back in February, I took on a short contract with The AntiSocial Engineer Limited. I’m a writer and marketer and the plan was to help this awesome small business get a lot of the ideas they had for blogs down …
From Web Developer to Professional Scammer
When considering a career change, it’s always good to stick to an element of what you know and ensure that some of your skills are transferable. When ex-web developer, Chris, made the decision to leave the industry, he never thought …
Is Your Receptionist on Tinder?
Most of our social engineering jobs begin the same way – researching our “victims”. Whether it’s the accounts manager that we want to coax into paying a fake invoice, or the security guard who we need to convince to let …
Three People You Need To Watch Out For
When we carry out penetration tests on businesses, possibly the most crucial part is choosing the disguise and persona. There’s a lot more to it than sticking on a hat and glasses and remembering a script. After all, a lift …
We All Work For Namecheap
So you want to start your first phishing site. First of all, you need to purchase a domain. Something that will trick unsuspecting internet users into clicking on it and submitting their credentials. Then you have to secure a good-value …
Why is Mark Working at Midnight?
It can be easy to think that phishing attempts are nothing to worry about. After all, you’re never going to click on that email saying you’ve missed your Netflix payment when you cancelled your account back in 2018. But the …
The Power of the Flower
When you work in an office, there’s nothing better than when someone brings in their new baby or puppy for a meet and greet. Everyone immediately stops work and is temporarily wrapped up in a bubble of excitement. If an …
Why You Should Be Concerned By Jane’s Abrupt Emails
There’s nothing more satisfying than removing the “kind” from “kind regards” and smashing that send button when you’ve lost your patience with the recipient. If you’re on the receiving end, you probably know what’s caused this sudden removal of manners, …
Trust in SMS
Before we get into this blog, can we please just take a second to fondly remember the fallen… for many of us the source of this modern world we now feel so familiar with. You might not remember the the …
Those Who Cannot Remember The Past
Information security is a fast paced industry. Everyday, people are dropping exciting projects on GitHub, data breaches keep journalists in work, universities teach the next generation of practitioners and security companies churn out invoices. It’s all frenetic, it’s a turbo …
Pyrotechnic Pretexts
We recently saw a video posted by the London Fire Brigade on Twitter and it got us thinking. I’m sure followers of the blog know just what we thought already… It’s probably best to rate the London Fire Brigade on …
Phishing danger is just a hyphen away.
Followers of the blog will know that I’m not a fan of SMS. It’s spoofable, it’s hackable, it’s from 1981. I can’t even have a meal out in peace without finding SMS weaknesses that take over some random service. So …
InfoSE – Getting Social
Hosting a meet up in 2019 was a rather easy affair. You put the word out to your friends and peers, dropped a little hype on social media and headed to M&S to grab some snacks and few bottles of …
Guest Blog: Ed Tucker
In this guest blog we speak to Ed Tucker (@teddybreath). There is more to this dark horse than CISO of the year and I reckon he has a few tips up his sleeve for organisations. Let’s give him a shake …
How We Could Chat On Your WeChat
For those of you wanting a technical debrief of what happened, this blog might not be for you. I actually want to focus on something completely different. Please take the TL;Dr and be on your merry way. This is a …
Action For Fraud Victims
According to reputable sources, around 95% of the cases reported to Action Fraud are left unsolved. It’s unsure at which step of the journey the case could get shelved – but sadly the figures don’t make for good reading. Take …
Goodbye HTTP?
It’s now long a long established fact that HTTP is insecure. For those who don’t know, your data isn’t securely encrypted when sent between your device and the website. The lack of security means cybercriminals can easily take a copy …
Screeching at a Poster
You might have missed last weeks incident on Twitter. It started off as a casual bit of annoyance, but quickly escalated in to a full on witch hunt for the Police. For those of you hiding under a rock and …