Subliminal Hacking
The Art and Science of Social Engineering


In The Spotlight


PhishingIncrease
Social Engineering

91% Of All Attacks Attributable to Spear Phishing … Infograph by ProofPoint

Posted  December 11, 2013  by  Dale Pearson

I just received an email from Proofpoint, and its another one of their great Infographs. This is a great Infograph re-enforcing the fact that it only takes a single breach for the cost to be significant. Not surprisingly the information shows that 91% of All Attacks have some form of phishing attribution, and 95% of […]

Full Story »

PCWizard-Scammers
Subliminal Hacking

Wasting Time With The PC Wizard Scammers … Fixing The Problems You Never Knew You Had

Posted  November 20, 2013  by  Dale Pearson

So its a cold Monday morning in November 2013 and the phone rings, who could this be? Sadly its not someone calling me to tell me there are millions of pounds to be had if I can just send some money over, instead it turns out I have computer issues, but the friendly certified Microsoft […]

Full Story »

Longlining-Infographic-small
Social Engineering

Longlining … The 2013 Social Engineering Threat

Posted  May 10, 2013  by  Dale Pearson

I came across another great InfoGraph today from proofpoint on “Longlining” and I thought I would share it. This approach uses more targeted phishing emails along with various techniques in an attempt to avoid detection. 

Full Story »

socialengineering-diagram-small
Social Engineering

Why Social Engineering Works … Infograph by Veracode

Posted  March 11, 2013  by  Dale Pearson

I came across this great infograph from Veracode today on “Why Social Engineering Works”. Wish I had the time and the skill to put these infographs together, but here you go. (Its a relatively large file so please be patient while it loads)

Full Story »

OSINT
OSINT

OSINT Tools … Recommendations List

Posted  December 27, 2012  by  Dale Pearson

Free OSINT Tools. With the New Year fast approaching I thought now would be a great time to post the first draft of some recommended Open Source Intelligence (OSINT) gathering tools and resources. I will look to maintain this list overtime and have it grow, so if you come across something you think should be […]

Full Story »

 
 

 
Trance

Its Hypnosis Jim, but not as we know it.. Hypnosis without trance

Once again I am going to be jabbering on about Hypnosis again. So if you have not noticed by now hypnosis is something that is of great interest to me, and I think having at minimum an understanding of hypnotic language is a va...
by Dale Pearson
2

 
 
Legs

Body Talk.. Kick off your dancing shoes

The human body is a wonderful thing, I admit some more wonderful than others, but I digress. We all give of subtle signals, cues and tells. These are subconsciously taken in, but consciously we are not always aware of what is h...
by Dale Pearson
0

 
 
BruCon

Head Hacker Speaking at BruCon 2010.. Belgium Security Conference

BruCON is an annual security and hacker(*) conference providing two days of an interesting atmosphere for open discussions of critical infosec issues, privacy, information technology and its cultural/technical implications on s...
by Dale Pearson
4

 

 
Failure stamp

Hypnosis.. The No FAIL Protocol

Earlier on in the year I attended the Blackpool Magic Convention, it was a great event and I met some great hypnotists and magicians. Whilst I was there I was introduced to a guy called James Tripp. James came across as a nice ...
by Dale Pearson
0

 


 
NLP
NLPPattern

NLP Patterns… Not quite needle work and stitching

We have had our brief introduction to NLP, buts now lets give you some patterns you can try out and put to good use. I will point out that many NLP patterns seem very simple, but you need to remember they are all words we are f...
by Dale Pearson
2