Subscribers and regular visitors to the blog will know I am a fan of hypnosis, and like most things I am passionate for I am always on the look out to discover new ways of doing things, gaining perspective of others and generally a healthy thirst for knowledge. You will of noticed I have purchased […]
Back in October 2012 I attended a Pickpocket Training Day with Professional Opportunist James Brown, and I blogged about it on this site here. It was a great session and many people have asked me about it, but not everyone has the time to travel, or may have logistical and financial constraints based on geographical […]
Depending on your history and how you got into InfoSec you may or may not of been exposed to the world of developer testing, if you did I am sure you have many unhappy memories of arguing why “real” data should not be used in the testing world, and if like me you have horror […]
I just received an email from Proofpoint, and its another one of their great Infographs. This is a great Infograph re-enforcing the fact that it only takes a single breach for the cost to be significant. Not surprisingly the information shows that 91% of All Attacks have some form of phishing attribution, and 95% of […]
So its a cold Monday morning in November 2013 and the phone rings, who could this be? Sadly its not someone calling me to tell me there are millions of pounds to be had if I can just send some money over, instead it turns out I have computer issues, but the friendly certified Microsoft […]
In the autumn of 2009, Excalibur Conference 1.0 won great success in Wuxi. The conference invited some of the most respected experts in the world and delivered terrific speeches, breakouts, demos and competitions. We are honore...
There are many things that we may consider essential to have with us when engaging in a social engineering test, but ensuring you have your Get Out Of Jail Free card should be one of the top items on your list, along with a fak...
Security maturity is an interesting thing, and something I am often discussing with those I work with as well as those at various companies in a wide range of industry sectors. Specifically I am mostly interested in the maturit...
The aim of this post is to share tools for Social Engineers to include vishing in you engagements, and to make the rest of the world aware of just how simple and easy it is to Spoof someones Caller ID, so you can increase your ...
The ability to pick a lock may not be an essential social engineering skill, but I would say its an advantageous one to have, oh and its fun to. Wikipedia Definintion – Lock picking is the skill of unlocking a lock by ana...