Back in February, I took on a short contract with The AntiSocial Engineer. I’m a writer and marketer and the plan was to help this awesome small business get a lot of the ideas they had for blogs down on …
From Web Developer to Professional Scammer
When considering a career change, it’s always good to stick to an element of what you know and ensure that some of your skills are transferable. When ex-web developer, Chris, made the decision to leave the industry, he never thought …
Those Who Cannot Remember The Past
Information security is a fast paced industry. Everyday, people are dropping exciting projects on GitHub, data breaches keep journalists in work, universities teach the next generation of practitioners and security companies churn out invoices. It’s all frenetic, it’s a turbo …
Pyrotechnic Pretexts
We recently saw a video posted by the London Fire Brigade on Twitter and it got us thinking. I’m sure followers of the blog know just what we thought already… It’s probably best to rate the London Fire Brigade on …
Goodbye HTTP?
It’s now long a long established fact that HTTP is insecure. For those who don’t know, your data isn’t securely encrypted when sent between your device and the website. The lack of security means cybercriminals can easily take a copy …
Cyber Security Terminology
Get to know some useful cybersecurity terminology!
Modus Operandi
Hackers and cybercriminals are often dubbed to be same nefarious character. Hackers are skilled individuals, sometimes without releasing what good they can do with their skills. But what really motivates someone to become a cybercriminal.
The AntiSocial Engineer Newsletter
Hello! I am Richard, the founder of The AntiSocial Engineer and I wanted to introduce the new AntiSocial Newsletter. The team and I have waited several years to release a newsletter due to the desire to really make them special. …
VPNs for Normal People
It’s been quite a week in the media for VPN providers. Two large companies have had breaches of security in some way or another and the industry dumpster fire has had a fresh poke and a few new logs chucked …
Keeping Children Safe Online
Online safety for children isn’t just a blog for us. It’s the very reason our business was founded. We had this crazy idea to help the police years ago and remove some of the burden of social engineering attacks. The …
Remember Innovative Passwords
Ben is currently studying computer science at secondary school. He is on work experience at The AntiSocial Engineer learning about the challenges businesses face when it comes to cybercrime.
Play Your Cards Right
The banks can put people off with their legal jargon and never-ending variables.
We have done the research and wanted to share the vitals on your rights to help shoppers stay safe.
Troublesome Terminology
When tasked with teaching employees about social engineering, the industry doesn’t half make it hard. People sat in marketing that have never sent a phishing email, or set foot in an office with a key-logger in their pocket chirp up …
CEO Fraud: Cutting Everything Out
CEO Fraud is the catchy name for frauds that are committed by a criminal, that pretends to be the company CEO or another high-level member of staff. The internet is awash with guides about CEO Fraud, but few seem to …
Layered Learning
In our bubble of InfoSec, we can find ourselves feeling like we are fighting a loosing battle. We write perfect policies – that nobody reads and after your 5th security incident you can feel like you are bashing your head …
Cybersecurity Leadership Summit 2018 Europe
We had the pleasure of attending the Cybersecurity Leadership Summit 2018 Europe in Berlin and thought it would be a good idea to capture some of the event and hopefully pass on some of the conference for people who did …
Blueteam Tools In My Toolbox
From the very start of being interested in ‘hacking’ and Information Security I do wonder what influences the style, the culture… I mean we all love InfoSec redteams and the ways for a brief moment our minds provide us with …
Phishing, Evolved.
When we talk about phishing, the first thing people would associate with is the traditional phishing email. The click here. The “urgent action needed” kind of junk we see everyday in our inboxes… but is this still the case? Are …
Two Factors Of Security
Note: Before starting this article we couldn’t miss the opportunity to recommend people to this web page should you need help setting up two factor on your accounts – https://twofactorauth.org/ Google’s announcement that 10% of users use 2-factor authentication has been …
Exploiting Chrome Attacks to Educate Staff
Social engineering attacks can normally be quite deceptive and hard to understand, the attack should be a little like magic in the way a victim should be left questioning how you did it after it’s all over. Although as an industry …
- Page 1 of 2
- 1
- 2