Defending Against Vishing: Is It Really Possible?

Defending Against Vishing: Is It Really Possible?

Vishing, a word that was entered into the Oxford Dictionary in 2015, defines what we call “voice phishing”. Using the […] ...
The FBI Told Me: Analyzing the FBI’s Cyber Crime Report

The FBI Told Me: Analyzing the FBI’s Cyber Crime Report

When you are a vendor who provides a valuable service, you look for opportunities to help companies. Sometimes, a vendor’s […] ...
Social Engineering News Vishing

Social Engineering News: Vishing

If an employee falls victim to a vishing attack it could potentially compromise an entire company. As the following statistics show, vishing is a serious social engineering attack vector facing ...
Aftermath of a Social Engineering Engagement

Aftermath of a Social Engineering Engagement

You have heard all the stories. Social engineers (SEs) being held at gunpoint, nearly driving off cliffs, jumping into garbage chutes, or walking through front doors. (If you haven’t heard ...
The Role of Empathy in Ethical Social Engineering

The Role of Empathy in Ethical Social Engineering

As cybersecurity becomes an ever-increasing concern, more people are becoming interested in a career in the field of cybersecurity. A major factor of cybersecurity is learning how cybercriminals use social ...
Analyzing the 2020 Twitter Attack

Analyzing the 2020 Twitter Attack

On July 15, 2020 the social media platform, Twitter, seemed to be operating normally. The hot topics of the day were about rapper T-Pain’s newest spat with recording artist Travis ...
guilt as social engineer

Dealing with Guilt as a Social Engineer

Are you new to the field of social engineering? Or does this career interest you? If so, dealing with guilt as a social engineer will be something you will  need ...
Healthcare: Elite Data

Healthcare: Elite Data

The healthcare industry is overwhelmingly reliant on internet-connected devices as solutions. There’s no doubt some of those devices advance patient care and even critical response. Healthcare possesses elite data making ...
A Practical Course in a Virtual World

Advanced Practical Social Engineering: A Practical Course in a Virtual World

Much of social engineering takes place via technology—phishing and vishing (voice phishing) being prime examples. However, holding a social engineering class virtually was not something Social-Engineer, LLC took lightly. Our ...
Which Industries Are the Biggest Security Targets?

Which Industries Are the Biggest Security Targets?

How is your industry faring in the cyberwar we all seem to find ourselves in? Business and security leaders the world over face the same dilemma: as they increase investment in sophisticated ...