When Pretext Meets Reality
Social Engineer
by Social-Engineer
3w ago
I take a sip of my coffee and put on my headset, I’m ready to start my workday. A large portion of my work consists of making vishing (voice phishing) calls, where we test our clients’ employees. I look at my pretext notes and take a deep breath as I get into character to play the alias for that particular client. As I dial the number, I hear the familiar hold music. This time however, I was surprised when the agent answered the phone for they answered in Spanish…the language of my heart. What you may not know is, I was born in Spain. Even though I am Spanish, for just a split second I was spe ..read more
Visit website
Concession in Social Engineering
Social Engineer
by Social-Engineer
3w ago
You’re sitting at home when you receive a call from a charity you’ve donated to in the past. They explain that they appreciate your previous donation and have been calling your neighbors who have been donating an average of $200. “Oh, I can’t afford that!” you respond. “We understand,” they say, “how about $20?” This, you think, you can do. Unknowingly, you have just succumbed to a technique we in social engineering refer to as “concession.” What exactly is concession? How is it used? What are ways we can be more aware of concession being used against us? Let’s dive in. What is Concession? Con ..read more
Visit website
A Beginner’s Take on Social Engineering – Part 1
Social Engineer
by Social-Engineer
1M ago
I’ll be honest, I never expected to see myself here… I’ve looked for well over a year at positions within the ever-expanding cybersecurity field – but nothing stood out. Were the offers for salary high? Were there well-known companies hiring within the industry? Most definitely. But no positions really spoke to my interests. Positions that truly attracted that deep, inner curiosity. Until now. I write this to highlight a key breakthrough I’ve encountered so far at Social-Engineer, LLC (SECOM), that until now, I hadn’t truly grasped at a fundamental level. Gaining the perspective of a beginner ..read more
Visit website
Impersonating Confidence
Social Engineer
by Social-Engineer
2M ago
For some, lack of confidence could mean they’re not very sociable. For others, it could be crippling and could hold them back from reaching their full potential, either personally or professionally. Lacking confidence is usually rooted in personal experiences, such as upbringing, comparison to others, and even personality traits. Some may feel that there’s no way to overcome a lack of self-confidence. But can impersonating confidence actually lead to feeling self-confidence? Impersonation Merriam’s dictionary defines impersonation as “to assume or act the character of.” Professional actors of ..read more
Visit website
How SE Helped Me in Public Speaking
Social Engineer
by Social-Engineer
2M ago
Public speaking is something that many people struggle with. In fact, 75% of the population has a fear of public speaking. Just the mere mention of it may start to make your heart race, if it is a fear of yours! Truth be told, I most definitely fall into the 75% category. Don’t get me wrong, I enjoy talking to people! In fact, it is something I do almost every day as a Human Risk Analyst. However, speaking to an audience is a whole different beast. I recently gave my first company speech entitled, “The Factor of Human Error.” In prepping for my speech, I realized that the techniques I daily us ..read more
Visit website
The Journey to Becoming a Human Risk Analyst
Social Engineer
by Social-Engineer
3M ago
When people hear that I get to write phishing emails and make vishing calls for a living, the first question they generally ask is, “How did you get into that field?” For some, the next question is, “How do I get into that field?” If you’re part of the latter group, this newsletter is for you. Let’s explore the tips and tricks to getting into the trade. Hopefully, this perspective will help you start or continue your journey to becoming a Human Risk Analyst. Start Building Your Industry Knowledge First and foremost, you must begin by building your industry knowledge. There are many free resou ..read more
Visit website
Child Safety on the Internet
Social Engineer
by Social-Engineer
4M ago
“How do I keep my child safe on the internet?” This question is hard to answer in a few minutes because it is one that is so complex. And since this topic is so vast, let’s focus on one sector, Social Media. Did you know that 95% of youth today report using social media? “Youth” is somewhat vague, so let’s narrow that down. Forty percent of 8 to 12-year-olds use social media, reports the 2023 Social Media and Youth Mental Health – The U.S. Surgeon General’s Advisory. Keep in mind that social media is not inherently good or bad. However, there are some things we should remember if our child or ..read more
Visit website
An Empathic Approach to Security Education
Social Engineer
by Social-Engineer
4M ago
What would you say are some traits of someone who is empathic? I would say some of those attributes would include being patient, attentive, understanding and a good listener. Now, think back to when a teacher who was empathic and went the extra mile to help you or other students that may have been struggling in that class. Surely, that contributed to a better learning environment and encouraged you to do better in that class. As adults we tend to lose some of that empathy when teaching other adults as we may reason “they should know better.” How can an empathic approach improve security educat ..read more
Visit website
End of Year Scams
Social Engineer
by Social-Engineer
5M ago
As 2023 comes to an end, it brings along with it a time many people look forward to: the holiday season. With this time of year coming around, however, we see an increasing amount of holiday related scams. Because of this, we want to review common end-of-year scams and how to guard against them. The FBI states that one of the most common scams is non-delivery crimes. Phishing emails with holiday themes will also increase during this time of year. You may even come across scams on social media! Let’s look together at these scams and learn how to protect ourselves from them. Non-delivery Scams ..read more
Visit website
Impersonation Scams: Why Are They So Dangerous?
Social Engineer
by Social-Engineer
6M ago
At Social-Engineer, we define impersonation as “the practice of pretexting as another person with the goal of obtaining information or access to a person, company, or computer system.” In today’s digitally driven world, impersonation scams have become a growing concern, leaving countless individuals and organizations vulnerable to financial loss, identity theft, and reputational damage. Impersonation scams are deceptive tactics used by cybercriminals to pose as trusted entities or individuals to exploit victims. This blog will delve into the various types of impersonation scams, shed light on ..read more
Visit website

Follow Social Engineer on FeedSpot

Continue with Google
Continue with Apple
OR