Overview
Books
Book: Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Completely rewritten 8th edition (2021) contains over 650 pages throughout 31 chapters! It is time to...
Book: Thinking, Fast and Slow
In the international bestseller, Thinking, Fast and Slow, Daniel Kahneman, takes us on a groundbreaking tour...
Book: Influence: The Psychology of Persuasion, Revised Edition
You’ll learn Cialdini’s Universal Principles of Influence, including new research and new uses so you can...
Courses
Course: Learn Social Engineering From Scratch
Learn how to hack accounts & personal devices (Windows, Mac OS X, Linux & Android) & how to secure yourself...
Course: SOCIAL ENGINEERING TRAINING
Core part of our training is the card game HATCH (Hack and Trick Capricious Humans) which teaches everyone to identify and prevent...
Documents
An introduction to social engineering
Social engineering is one of the most prolific and effective means of gaining access to secure systems and obtaining sensitive information,
Definitions
Pretexting
In a pretexting attack, attackers create a fake identity and...
Dumpster Diving
Attackers collect information from discarded materials such as old computer...
Baiting
Baiting attacks use a false promise to pique a victim’s...
Documents
An introduction to social engineering
Social engineering is one of the most prolific and effective...
Social engineering: A cheat sheet for business professionals
Con artists have been performing social engineering tricks for centuries....
Social Engineering: MITIGATING HUMAN RISK IN BANKING TRANSACTIONS
Social engineering is not a new concept, but it is...
Entertainment
Sneakers (1992)
Sneakers is a 1992 American comedy caper film directed by...
TV Show: Tiger Team (2007)
The show follows a civilian tiger team composed of Chris Nickerson, Luke...
Movie: Who Am I (2014 film)
Who Am is a 2014 German techno-thriller. It is centered...
Podcasts
The Social-Engineer Podcast
Welcome to the Social-Engineer Podcast! The second Monday of each month we will be releasing a new and exciting episode,...
Naked Security by Sophos
We take an expert look at the latest cybersecurity incidents, how they happened, and why.
FBI, This Week: Social Engineering
As part of National Cyber Security Awareness Month, the FBI says one way to stay safe online is to recognize...
Quotes
“It is important to note that most websites are vulnerable to exploit…”
Anup Ghosh - CEO of Fidelis Cybersecurity
“The bad guy’s method is to become friends, get the victim to do them a favor…”
Roger G. Johnston - Head of Right Brain Sekurity
“Many of the decisions we make come from basic human nature and behavior…”
Michele Fincher - Information Security Assurance Lead at The Lubrizol Corporation
Tools
King Phisher
King Phisher is a tool for testing and promoting user awareness by simulating real world phishing attacks.
Tool: CUPP – Common User Passwords Profiler
CUPP: It is a password profiler tool