Remove Hacking Remove InfoSec Remove Social Engineering Remove Workshop
article thumbnail

Acting Skills Helped Me Become a Vishing Professional

Security Through Education

I am currently a full-time social engineering pentesting professional with Social-Engineer, LLC (SECOM). The Social Engineering Framework defines vishing as the “practice of eliciting information or attempting to influence action over the telephone.” I’m not originally from the InfoSec world.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.

Hacking 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.

Hacking 40
article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

In information security (infosec) there is the need to be on the latest version. Writing exploits or developing infosec tools is no exception, they often need to have access to the latest libraries. We did not want to step on any other projects toes in infosec realm, or even IT in general. How did you pick the name?

InfoSec 52
article thumbnail

Beg Bounties

Troy Hunt

Or maybe he's done this enough times now (which subsequent replies to this thread with his previous attempts suggest) that he's learned enough social engineering to know not to go too hard on the first approach. Maybe he forgot?

Scams 69
article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

The FTC claims that spy phones secretly harvested and shared data on people's physical movements phone news online activities through a hidden hack. It's about challenging our expectations about the people who hack for a living. Vamosi: That talk focused on the fact that there are InfoSec hackers openly working to address this problem.