impersonation
Socially Engineered Into Stealing $500,000 From a Casino
A cashier at a Colorado casino is accused of stealing half a million dollars in cash after allegedly being duped by phone calls and text messages from imposters posing as her bosses ...
Security Boulevard
Lessons from a Scam Artist
Social-Engineer | | General Social Engineer Blog, how do scammers use social engineering, impersonation, Lessons from a scam artist, Phishing, smishing, social engineering, techniques scammers use, vishing
What does a government scam, an IT support scam and a romance scam have in common? They all use psychology […] ...
A Device to Turn Traffic Lights Green
Here’s a story about a hacker who reprogrammed a device called “Flipper Zero” to mimic Opticom transmitters—to turn traffic lights in his path green. As mentioned earlier, the Flipper Zero has a ...
Defending against AI Lobbyists
When is it time to start worrying about artificial intelligence interfering in our democracy? Maybe when an AI writes a letter to The New York Times opposing the regulation of its own ...
Social Engineering and Healthcare
Social-Engineer | | Cybersecurity, Cybersecurity Training, impersonation, Infosec, Newsletter, Phishing, smishing, social engineering and healthcare, vishing
Social engineering has become a larger threat to the healthcare industry in recent years. So much so that the Federal […] ...
Three key variables you need to optimize for a successful phishing simulation program
Scott | | backlash, Creating Active Awareness, difficulty, Employee Awareness, frequency, Home, impersonation, Phishing, Phishing assessments, phishing exercises, phishing simulations, phishing tests, Security Awareness, Security Culture, tips
The post Three key variables you need to optimize for a successful phishing simulation program appeared first on Click Armor ...
Obligatory ChatGPT Post
Seems like absolutely everyone everywhere is playing with Chat GPT. So I did, too…. Write an essay in the style of Bruce Schneier on how ChatGPT will affect cybersecurity. As with any ...
Impersonation, Fraud and the Future of Deepfakes
All kinds of documents, communications, emails, text messages and other kinds of messages require authentication to be binding on the parties and to be admissible in court as evidence of the binding ...
Security Boulevard
Stronger Security Posture: Where to Start
Social-Engineer | | Cyber Security, General, impersonation, Phishing, Protect Yourself, smishing, social engineering, Stronger Security Posture:, vishing
We talk about information security and its importance all the time. The multitude of attacks in 2022 alone demonstrates its […] ...
Authentically Inauthentic
Social-Engineer | | amy cuddy, APSE, authentic, comfort zone, impersonating, impersonation, inauthentic, Mark Bowden, Newsletter, rosa rowles, social engineering
Part of the job of a social engineer is creating a good pretext or a good story, that you tell […] ...