The AntiSocial Blocklist was a concept debated quickly in a passing idea, it quickly spiralled off into an obsession. The logic was obtained from working with victims of crime and our hands on experience of social engineering attacks. We know …
Looking For Fraud
Here at The AntiSocial Engineer we are always keen to identify the things that enable social engineers. The name is more than a play on words, our business is all about throwing the spanners into serious organised crime and making …
CEO Fraud: Cutting Everything Out
CEO Fraud is the catchy name for frauds that are committed by a criminal, that pretends to be the company CEO or another high-level member of staff. The internet is awash with guides about CEO Fraud, but few seem to …
Twitter is Broken
Twitter by SMS So let’s get the boring stuff out the way! if you have a phone number connected to your Twitter account you can SMS Twitter and do social media stuff via SMS message. An SMS of ‘RT @Twitter’ …
The AntiSocial AntiGrinch Giveaway
Because it’s Christmas we thought it would be good if we could give back and try to get five six lucky families using a secure password manager – like 1Password. We want to give lucky winners a voucher to start their family …
Diamonds and Dirt
I quite like diamonds. Not for their look but for the whole backstory on why they are so desired today. The De Beers ‘cartel’, amongst others, inflated the price of diamonds since the 1800s. Around 1938 the De Beers diamond group …
Layered Learning
In our bubble of InfoSec, we can find ourselves feeling like we are fighting a loosing battle. We write perfect policies – that nobody reads and after your 5th security incident you can feel like you are bashing your head …
Cybersecurity Leadership Summit 2018 Europe
We had the pleasure of attending the Cybersecurity Leadership Summit 2018 Europe in Berlin and thought it would be a good idea to capture some of the event and hopefully pass on some of the conference for people who did …
Argos Doesn’t Take Care of IT
So recently I needed a computer monitor in a hurry, I was in the north and I wanted a monitor to be collected by a colleague in the south. My mind pondered several next day options but then it hit …
The Romance Scam
There was a simpler time where people would send post cards asking for pen-friends. A friendship slowly developed and they would ask for a small amount of money. With the advent of the internet all this changed though, scammers could …
Some AntiSocial Password Advice
Advice on passwords is getting out of hand. Just round and round in the echo chamber of infosec with our highly subjective opinions. It serves only to confuse users and does little to actually change the habits we see around password …
Blueteam Tools In My Toolbox
From the very start of being interested in ‘hacking’ and Information Security I do wonder what influences the style, the culture… I mean we all love InfoSec redteams and the ways for a brief moment our minds provide us with …
Trivial Mistakes On Trello
Open Source Intelligence (OSINT) is the practice of using publicly available data about a target company or person. In our field of work it’s critical because it gives you all the juicy details you can later turn into a pretext. …
Sim Swap Fraud – A Victim’s Perspective
For many victims of SIM Swap Fraud, the first time they learn about the attack is in the hours after their life has been changed forever. It’s an all too common story, the signal bars disappear from your mobile phone, …
Technology Makes Us Safer… Sometimes…
Whilst many of us in Information Security are struggling to patch the broken and educate the confused, the largest of the corporates seem to be making giant leaps in protecting their customers. None more so then the banking sectors! Of …
Shut Up About Facebook
People seem annoyed recently that a little known company called Cambridge Analytica have been accused of doing some pretty dodgy things with our data. I mean, it truly was an edge of the seat expose by Channel 4 – at …
Phishing, Evolved.
When we talk about phishing, the first thing people would associate with is the traditional phishing email. The click here. The “urgent action needed” kind of junk we see everyday in our inboxes… but is this still the case? Are …
Two Factors Of Security
Note: Before starting this article we couldn’t miss the opportunity to recommend people to this web page should you need help setting up two factor on your accounts – https://twofactorauth.org/ Google’s announcement that 10% of users use 2-factor authentication has been …
Let’s forget the phishing dangers, is email getting us down?
In no way are we trying to diminish the importance of good email security practice, but sometimes I think about the unforeseen impact email can have on our daily lives. We focus on the fancy malware and the sophisticated credential …
Advanced Phishing Techniques and TalkTalk
We have already had our dealings with TalkTalk as covered in our earlier blogs here and here. We felt the need to disclose their 2015 Data breach previously, but it does disappoint us to need to write again. This isn’t a …