How phishing scammers manipulate your amygdala and oxytocin | Christopher Hadnagy | TEDxFultonStreet

The Rise of Phishing Attacks: P.S. ILoveYou

In This Issue: "The Rise of Phishing Attacks: P.S. I Love You". IILOVEYOU. Did you ever receive an email with that subject line? Millions did in May 2000. It was a game changer for social engineering, and in fact, saw the beginning of the rise of phishing attacks. Social engineering ... Read More
#VoCo. Adobe Audio Manipulator Sneak Peak with Jordan Peele | Adobe Creative Cloud

Deepfakes: How to Defend Yourself from Attack

Deepfake attacks - anyone who has a presence on social media is vulnerable. Find out how you can defend yourself and your company against them in latest blog, "Deepfakes: How to Defend Yourself from Attack". The post Deepfakes: How to Defend Yourself from Attack appeared first on Security Through Education ... Read More
mental health

Maintaining Mental Health While Working from Home

In This Issue: “Maintaining Mental Health While Working from Home”. The May newsletter focuses on mental health while working from home. First, we’ll discuss what is meant by mental health and how staying connected professionally and personally promotes well-being. Additionally, we’ll provide online resources for when you need to talk ... Read More
How phishing scammers manipulate your amygdala and oxytocin | Christopher Hadnagy | TEDxFultonStreet

COVID-19 and Amygdala Hijacking in Cyber Security Scams

COVID-19 scams target our heightened sense of fear and anxiety. It's known as amygdala hijacking. In this blog, you'll find out how to see through the scam. The post COVID-19 and Amygdala Hijacking in Cyber Security Scams appeared first on Security Through Education ... Read More
Remote Working Cybersecurity tips

Working Remotely: Cybersecurity Tips to Work from Home Safely

In This Issue: "Working Remotely: Cybersecurity Tips to Work from Home Safely". The coronavirus is dramatically increasing the number of people working remotely. In this month’s newsletter, we’ll alert you to a current cybersecurity threat, provide a starters checklist of necessary infrastructure and policies, as well as tips to work ... Read More
three skills you need to be a successful social engineer

Get the Skills You Need to Be a Successful Social Engineer

In This Issue: “Get the Skills You Need to Be a Successful Social Engineer” What skills do you need to be a social engineer? The March newsletter answers that question by narrowing the focus to two specific skill groups: interpersonal and technical skills. We’ll also discuss how to use social ... Read More
SEVillage at Def Con 28!

Launch of the SEVIllage at Def Con 28!

We're announcing the launch of the SEVillage at Def Con 28! Find out how you can sign up for all of our exciting competitions and more! The post Launch of the SEVIllage at Def Con 28! appeared first on Security Through Education ... Read More
is your front door secure

Is Your Front Door Secure?

In This Issue: “Is Your Front Door Secure?” The corporate front door is under attack. But what is the front door of your company? And why is it so important to know if your company’s front door is secure? Our February newsletter answers these questions. The post Is Your Front ... Read More
Ryan MacDougall - OSINT in the Real World - DEF CON 27 Social Engineering Village

What Is Your Favorite OSINT Tool?

In This Issue: "What is Your Favorite OSINT Tool?" Ryan MacDougall, an OSINT trainer and speaker on the topic, answers how and when to choose and use tools for an investigation.  The post What Is Your Favorite OSINT Tool? appeared first on Security Through Education ... Read More
Hey Alexa, Whats a Phone Book?

“Hey Alexa, What’s a Phone Book?”

Recently, my husband came home from his day at work and during our normal evening conversation, I asked, “How was work today?” His reply was, “It was alright, we had another order of phone books come in.” My immediate response was to ask, “Who even uses phone books anymore?” The ... Read More