The Explain The Humans series takes a look at common components of psychology and makes sure your security awareness program is aligned with the way real people work, learn and interact. The series will be heavily supported by the expertise …
Guest Blog: Ed Tucker
In this guest blog we speak to Ed Tucker (@teddybreath). There is more to this dark horse than CISO of the year and I reckon he has a few tips up his sleeve for organisations. Let’s give him a shake …
Explaining Physical Social Engineering
The world of Red-teams and Social Engineering can be quite insular. As someone who founded The AntiSocial Engineer Limited, I know that was almost part of the design and philosophy at the time. We weren’t interested in doing things like …
Cyber Security Terminology
Get to know some useful cybersecurity terminology!
Troublesome Terminology
When tasked with teaching employees about social engineering, the industry doesn’t half make it hard. People sat in marketing that have never sent a phishing email, or set foot in an office with a key-logger in their pocket chirp up …
CEO Fraud: Cutting Everything Out
CEO Fraud is the catchy name for frauds that are committed by a criminal, that pretends to be the company CEO or another high-level member of staff. The internet is awash with guides about CEO Fraud, but few seem to …
The AntiSocial AntiGrinch Giveaway
Because it’s Christmas we thought it would be good if we could give back and try to get five six lucky families using a secure password manager – like 1Password. We want to give lucky winners a voucher to start their family …
Cybersecurity Leadership Summit 2018 Europe
We had the pleasure of attending the Cybersecurity Leadership Summit 2018 Europe in Berlin and thought it would be a good idea to capture some of the event and hopefully pass on some of the conference for people who did …
The Romance Scam
There was a simpler time where people would send post cards asking for pen-friends. A friendship slowly developed and they would ask for a small amount of money. With the advent of the internet all this changed though, scammers could …
Blueteam Tools In My Toolbox
From the very start of being interested in ‘hacking’ and Information Security I do wonder what influences the style, the culture… I mean we all love InfoSec redteams and the ways for a brief moment our minds provide us with …
Sim Swap Fraud – A Victim’s Perspective
For many victims of SIM Swap Fraud, the first time they learn about the attack is in the hours after their life has been changed forever. It’s an all too common story, the signal bars disappear from your mobile phone, …
G-Cloud 10
We take great pride in announcing The AntiSocial Engineer Limited has been entered into the G-Cloud 10 Framework and this signifies our ability to sell directly to HMG – in many Digital Marketplace listings we have even been listed first! …
As We Grow
It was Christmas Eve 2014 when I started The AntiSocial Engineer Limited. It was founded from a passion to secure people online and fuelled by utter hatred of how the information security industry was. The aim was simple, I wanted …
Phishing, Evolved.
When we talk about phishing, the first thing people would associate with is the traditional phishing email. The click here. The “urgent action needed” kind of junk we see everyday in our inboxes… but is this still the case? Are …
Two Factors Of Security
Note: Before starting this article we couldn’t miss the opportunity to recommend people to this web page should you need help setting up two factor on your accounts – https://twofactorauth.org/ Google’s announcement that 10% of users use 2-factor authentication has been …
Advanced Phishing Techniques and TalkTalk
We have already had our dealings with TalkTalk as covered in our earlier blogs here and here. We felt the need to disclose their 2015 Data breach previously, but it does disappoint us to need to write again. This isn’t a …
The Making of a Drop Box
A drop box is a small computer designed to be connected to a corporate network, once connected it should enable attackers remote access to the network through a variety of methods. We have seen similar devices used in the wild …
Malicious Packets
Recently we had quite an interesting engagement and we have been allowed to share some of the details! Objective: Gain physical entry to a building for the purpose of impromptu network penetration test and wireless testing. Company Arena: Global Offices, Finance, …
Exploiting Chrome Attacks to Educate Staff
Social engineering attacks can normally be quite deceptive and hard to understand, the attack should be a little like magic in the way a victim should be left questioning how you did it after it’s all over. Although as an industry …
Opening Up Fraudulent Invoices
We often talk about the unknown ‘attackers’ out to get us in the context of cyber security, but the majority of these types are not confrontational people – they barely deserve the term attacker. They hide in the shadows with …
- Page 1 of 2
- 1
- 2