Saturday, November 17, 2018
Home social-engineer

social-engineer

The Social-Engineer Podcast

Ep. 111 – Crypto AI Blockchain Smoothies at Walmart with Nick Furneaux

What does crypto currency, blockchain, artificial intelligence and Walmart smoothies have to do with social engineering?  Join us this month as Nick Furneaux lets us know. Nov 12, 2018 Contents Download Get Involved Download Ep. 111 – Crypto AI Blockchain Smoothies at Walmart with...
The Social-Engineer Podcast

Ep. 110 – From SECTF to Pro SE with Whitney and Rachel

So many times we get asked how can you become a professional social engineer.  This month we talk to two amazing women who where never in the industry, took a huge risk and it paid off.  Join us in...
The Social-Engineer Podcast

Ep. 109 – Do You Remember a Jennifer with Ian Rowland

I sense there is something important in your life? Something that you will be listening to shortly that will change the way you view… everything.  Join us with Ian Rowland to find out what that is…  September 10, 2018 Contents Download Get...
SC Magazine

Instagram flaw exposes user passwords

A security flaw in Instagram’s recently released “Download Your Data” tool could have exposed some user passwords, the company reportedly told users. The tool, revealed by Instagram right before the GDPR regulation went into effect, is designed to let users...

Julian Assange Charges, Japan’s Top Cybersecurity Official, and More Security News This Week

Safer browsing, more bitcoin scams, and the rest of the week's top security news.
The Register

SMS 2FA database leak drama, MageCart mishaps, Black Friday badware, and more

Plus, why is Kaspersky Lab getting into chess? Roundup  What a week it has been: we had the creation of a new government agency, a meltdown flashback, and of course, Patch Tuesday.…
TechRepublic

Is retaining a cybersecurity attorney a good idea for your business?

Cybersecurity is so complicated that businesses, large and small, are retaining legal counsel specializing in security. Learn two more steps businesses should take before a cyberattack hits.

Machine Learning Can Create Fake ‘Master Key’ Fingerprints

Researchers have refined a technique to create so-called DeepMasterPrints, fake fingerprints designed to get past security.