Remove Cybersecurity Remove InfoSec Remove Social Engineering Remove Technology
article thumbnail

Alyssa Miller: Charting the Course Through InfoSec and Aviation

Security Boulevard

In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey in aviation and being a pilot.

InfoSec 67
article thumbnail

The Psychic and the Social Engineer

Security Through Education

By now you may be guessing what the psychic and the social engineer have in common. Both use techniques such as using social cues, making broad statements, and using probability to create the illusion of credibility. Similarly, a professional social engineer must exhibit confidence and never break pretext.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are Ethics and Social Engineering Compatible?

Security Through Education

Many people assume that as professional social engineers (SE) we use EVERY method possible to achieve our objective. Are ethics and social engineering compatible? The Social Engineering Code of Ethics Accomplishes Important Goals. Provides guidance on how to conduct a social engineering business.

article thumbnail

Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data

Security Boulevard

The Tim Hortons mobile app created a “a mass invasion of Canadians’ privacy” by conducting continuous location tracking without user consent even when the app was closed, what is a social engineering kill-chain and how can this help understand and prevent attacks, and new research shows 33 out of the top 100 hospitals in America […].

article thumbnail

ChatGPT: What are the Implications for Infosec?

SecureWorld News

The ability to ask any question on just about any topic and have a very intelligent answer given has cybersecurity experts wondering if the infosec community is using it and, if so, for what; and, if so, how is it working for writing scripts and code or imitating phishing emails, for instance.

InfoSec 131
article thumbnail

Facebook Dumps Face Recognition, Social Engineering Bots, US Sanctions NSO Group

Security Boulevard

The post Facebook Dumps Face Recognition, Social Engineering Bots, US Sanctions NSO Group appeared first on The Shared Security Show. The post Facebook Dumps Face Recognition, Social Engineering Bots, US Sanctions NSO Group appeared first on Security Boulevard.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Fifteen years after the launch of the microblogging social media platform, Twitter remains a dominant public forum for instant communication with individuals and organizations worldwide on a universe of topics, including #cybersecurity. Top Cybersecurity Experts to Follow on Twitter. Binni Shah | @binitamshah.