Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Longlining … The 2013 Social Engineering Threat

I came across another great InfoGraph today from proofpoint on “Longlining” and I thought I would share it. This approach uses more targeted phishing emails along with various techniques in an attempt to avoid detec...
by Dale Pearson
3

 
 

The Professional Opportunist … A Book Review

So I cant quite remember when it was, but I think it was the late part of 2010 that I stumbled across the work of this guy who goes by the name of James Brown. No not the musical one (although he may be a great singer), the one...
by Dale Pearson
0

 
 

Social Engineering, What , When, Why and How

In the first series of posts I want to cover the basics of each topic. A good place to start is Social Engineering, so lets kick off with what its all about, when its used, as well as the why and how’s involved. Wikipedia...
by Dale Pearson
0

 

 

Subliminal Hacking at Hash Days 2011 … Swiss Security Conference

Hashdays is the premier technical security conference in the center of Switzerland organized by DEFCON Switzerland. During 4 days the center of Switzerland will become also the center of IT security knowledge transfer. On Octo...
by Dale Pearson
3

 
 

Derren Brown Apocalypse … Fake or Real … My Opinion

I should start this post by saying that I am a huge Derren Brown fan, so I am probably commenting from a biased / rose tinted view but I am certainly trying not to when I share my views on Derren’s latest TV offering Apoc...
by Dale Pearson
7