We recently saw a video posted by the London Fire Brigade on Twitter and it got us thinking. I’m sure followers of the blog know just what we thought already… It’s probably best to rate the London Fire Brigade on …
Phishing danger is just a hyphen away.
Followers of the blog will know that I’m not a fan of SMS. It’s spoofable, it’s hackable, it’s from 1981. I can’t even have a meal out in peace without finding SMS weaknesses that take over some random service. So …
InfoSE – Getting Social
Hosting a meet up in 2019 was a rather easy affair. You put the word out to your friends and peers, dropped a little hype on social media and headed to M&S to grab some snacks and few bottles of …
Guest Blog: Ed Tucker
In this guest blog we speak to Ed Tucker (@teddybreath). There is more to this dark horse than CISO of the year and I reckon he has a few tips up his sleeve for organisations. Let’s give him a shake …
How We Could Chat On Your WeChat
For those of you wanting a technical debrief of what happened, this blog might not be for you. I actually want to focus on something completely different. Please take the TL;Dr and be on your merry way. This is a …
Action For Fraud Victims
According to reputable sources, around 95% of the cases reported to Action Fraud are left unsolved. It’s unsure at which step of the journey the case could get shelved – but sadly the figures don’t make for good reading. Take …
Goodbye HTTP?
It’s now long a long established fact that HTTP is insecure. For those who don’t know, your data isn’t securely encrypted when sent between your device and the website. The lack of security means cybercriminals can easily take a copy …
Screeching at a Poster
You might have missed last weeks incident on Twitter. It started off as a casual bit of annoyance, but quickly escalated in to a full on witch hunt for the Police. For those of you hiding under a rock and …
Explaining Physical Social Engineering
The world of Red-teams and Social Engineering can be quite insular. As someone who founded The AntiSocial Engineer Limited, I know that was almost part of the design and philosophy at the time. We weren’t interested in doing things like …
Cocaine & Credentials
I recently had the pleasure to watch a talk at BSides Leeds by Darren Martyn. He’s a security researcher who really understands the criminal ecosystem of stolen credentials. The talk focussed on ‘scum lords’, the term he chooses for those …
Cyber Security Terminology
Get to know some useful cybersecurity terminology!
Modus Operandi
Hackers and cybercriminals are often dubbed to be same nefarious character. Hackers are skilled individuals, sometimes without releasing what good they can do with their skills. But what really motivates someone to become a cybercriminal.
VPNs for Normal People
It’s been quite a week in the media for VPN providers. Two large companies have had breaches of security in some way or another and the industry dumpster fire has had a fresh poke and a few new logs chucked …
Keeping Children Safe Online
Online safety for children isn’t just a blog for us. It’s the very reason our business was founded. We had this crazy idea to help the police years ago and remove some of the burden of social engineering attacks. The …
Remember Innovative Passwords
Ben is currently studying computer science at secondary school. He is on work experience at The AntiSocial Engineer Limited learning about the challenges businesses face when it comes to cybercrime.
Play Your Cards Right
The banks can put people off with their legal jargon and never-ending variables.
We have done the research and wanted to share the vitals on your rights to help shoppers stay safe.
Hey Siri, ruin my life
Normally we take pride in demonstrating a cutting edge social engineering technique, but as I write this article the only feeling I have is utter dismay. I am ashamed of the regulatory body. Ofcom (The Office of Communications, the UK …
Troublesome Terminology
When tasked with teaching employees about social engineering, the industry doesn’t half make it hard. People sat in marketing that have never sent a phishing email, or set foot in an office with a key-logger in their pocket chirp up …
How To Activate 2-Factor
Have you ever wondered how you activate 2-factor? This 2 minute guide will help you understand this.
All Inclusive Scams
If there is one thing that always impresses me it’s the ways scammers rotate what they do, many marketing teams could learn a thing or two by watching this. Scammers are always the first ones to exploit seasonal events. Be …