Remove Book Remove InfoSec Remove Internet Remove Social Engineering
article thumbnail

Cyber Pearl Harbor Is Happening Right Now — It’s Ransomware

Daniel Miessler

Since 2007 the InfoSec industry has been talking about TheBigOne™—the event that would change cyber threats from annoyances to existential concerns. The idea was that it’d be some massive blast that would take out the country’s power grid, or disable the entire internet, along with what they used to call e-commerce.

article thumbnail

OSINT in 60 seconds. Mind reading on TV

Pen Test Partners

Sometimes you don’t even need this level complexity as people often provide their full name and email (and other details) when booking tickets for example. These are common con techniques and used by social engineers. This could give scammers a head start, allowing them to gather information days or weeks in advance.

Scams 73
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. I've mentioned before but InfoSec Twitter is a valuable resource. For many, though, that isn’t true.

Hacking 40
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. There's a serious shortage of InfoSec professionals. I've mentioned before but InfoSec Twitter is a valuable resource. For many, though, that isn’t true.

Hacking 40
article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

Fortunately, there are those in the InfoSec world, who are actively looking at the subject and speaking out at conferences, such as Black Hat. Vamosi: That talk focused on the fact that there are InfoSec hackers openly working to address this problem. Vamosi: That's a gray area with the Internet of Things.

article thumbnail

The Hacker Mind Podcast: Tib3rius

ForAllSecure

No, I simply bought Shon Harris’s massive book CISSP- All-in-One Exam Guide -- and read through it -- not one, twice. And yeah, we check us out at whiteoaksecurity.com to various ranges of pen tests, like web apps, internals, red teams, social engineering, etc. So most of our apps are mostly upside tests over the internet.

DNS 40