Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

The Risks of Posting in Social Networks … By Trend Micro

I found this awesome Infograph put together by Trend Micro on the Risks o Posting in Social Networks. I cant remember exactly where I found it now but I saved the image so I am posting it here. If you know where it came from fe...
by Dale Pearson
1

 
 

Pickpocket Training … The Professional Opportunist Way!

Update: James now has an excellent online course, check it out here and learn the easy steal technique for free. So the weekend just gone (28th October 2012) I had the pleasure of attending James Brown’s P.O.W.A Pick Pock...
by Dale Pearson
3

 
 

Remember Remember … Constructing A Memory Palace

So today is the Royal Wedding, and I am sure of you hadn’t forgotten that. However as we have discussed before the memory isn’t really the best at remembering stuff, and our subconscious is only to happy to fill in ...
by Dale Pearson
3

 

 

Social Engineering, What , When, Why and How

In the first series of posts I want to cover the basics of each topic. A good place to start is Social Engineering, so lets kick off with what its all about, when its used, as well as the why and how’s involved. Wikipedia...
by Dale Pearson
0

 
 

Faking It To Make It … Fake Data Generation Recommendations List

Depending on your history and how you got into InfoSec you may or may not of been exposed to the world of developer testing, if you did I am sure you have many unhappy memories of arguing why “real” data should not ...
by Dale Pearson
1