Subscribers and regular visitors to the blog will know I am a fan of hypnosis, and like most things I am passionate for I am always on the look out to discover new ways of doing things, gaining perspective of others and generally a healthy thirst for knowledge. You will of noticed I have purchased […]
Back in October 2012 I attended a Pickpocket Training Day with Professional Opportunist James Brown, and I blogged about it on this site here. It was a great session and many people have asked me about it, but not everyone has the time to travel, or may have logistical and financial constraints based on geographical […]
Depending on your history and how you got into InfoSec you may or may not of been exposed to the world of developer testing, if you did I am sure you have many unhappy memories of arguing why “real” data should not be used in the testing world, and if like me you have horror […]
I just received an email from Proofpoint, and its another one of their great Infographs. This is a great Infograph re-enforcing the fact that it only takes a single breach for the cost to be significant. Not surprisingly the information shows that 91% of All Attacks have some form of phishing attribution, and 95% of […]
So its a cold Monday morning in November 2013 and the phone rings, who could this be? Sadly its not someone calling me to tell me there are millions of pounds to be had if I can just send some money over, instead it turns out I have computer issues, but the friendly certified Microsoft […]
Over Christmas 2014 I caught up with some recorded TV, specifically Dynamo : Magician Impossible. One of the episodes I liked featured an effect where Dynamo take a bottle of water, pours some out and then shakes it and the wat...
In my talk Head Hacking – The Magic of Suggestion and Perception, I talk about the best type of Social Engineer, this is the Master Manipulator. Many people have these skills naturally, but may not be consciously aware of...
You know when you see an object, or hear a song and it instantly takes you back to a moment, and you begin to experience feelings and emotions as if you where re living it. This is essentially what anchoring is, and this is an ...
The Browser Exploitation Framework (BeEF) is an excellent tool for Social Engineers and Pentesters. This video provides a quick How To on installing it under Linux. The install from start to finish takes around 10 minutes, but ...
Regular visitors to the site will be familiar with the post on recommended OSINT tools, and one of those tools mentioned is Maltego. Maltego is an awesome tools that uses the power of machines to gather information and display ...