Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Attention Manipulation Techniques … Natural Buffer Overflows

A key part of being a Social Engineer is being able to create yourself windows of opportunity. These may be to distract peoples attention whilst you slip past a door, pull some keys from a key cabinet, acquire an access card ...
by Dale Pearson
2

 
 

Illusions of Trust … The Way of the Cyber Criminal

Trust is an important thing to most intelligent species, and without it relationships and general interactions cease to flourish and are nothing more than a professional exchange of dialogue. When you think about trust and the ...
by Dale Pearson
1

 
 

91% Of All Attacks Attributable to Spear Phishing … Infograph by ProofPoint

I just received an email from Proofpoint, and its another one of their great Infographs. This is a great Infograph re-enforcing the fact that it only takes a single breach for the cost to be significant. Not surprisingly the in...
by Dale Pearson
1

 

 

The Idiots That Get Socially Engineered

We are all familiar with Social Engineering, we experience it every day, its covered in the media and is utilised in various different contexts. However, a common theme that I read about, but also have people talk to me about i...
by Dale Pearson
0

 
 

USB STICK GSM BUG … REVIEW

In April 2012 I was fortunate enough to be given a free USB Stick from Online Spy Shop that is a GSM Bug as part of a small give away they were running. I have had this sat on the shelf since it arrived but havent found the tim...
by Dale Pearson
0