Archive | Social Engineering

How to get Ops and takeover a channel on IRC Hack Hacking

I’ve been spending a lot of time online lately reading all kinds of stupid text files on how to “Takeover Ops Boi!!!”, “eLeEt WaYs To gEt OpS!!!”, “HOW TO GET OPS ON SERVER SPLITS”, etc. We all know none of these things work, at least not for me. They’re either written by morons, or they […]

Tags: , , , , , , ,

Posted in: General Hacking, Old Skool Philes, Social Engineering | Add a Comment

‘Free’ USB Drives Defeat Company Security

This is an excellent case of Social Engineering, you could also consider it playing on human greed/ignorance/stupidity. Whatever you want to label it really ;) USB drives are a real security risk.. We recently got hired by a credit union to assess the security of its network. The client asked that we really push hard […]

Tags: , , , , , ,

Posted in: Malware, Social Engineering | Add a Comment

US Veterans Information Leaked on The Web

Another HUGE information leak from the US government, seems they can’t help themselves. Or perhaps people are just ramping up the efforts against them.. The Navy has begun a criminal investigation after Social Security numbers and other personal data for 28,000 sailors and family members were found on a civilian website. The Navy said Friday […]

Tags: , , , , ,

Posted in: General News, Hardware Hacking, Social Engineering | Add a Comment

Kevin Mitnick Interview on Social Engineering

There’s a good interview with Kevin Mitnick on Social Engineering. Well afterall, that is where his skill lies, not in technical hacking. Arrested by the FBI in 1995 and convicted of breaking into the systems of Fujitsu Siemens, Nokia and Sun Microsystems, Mitnick served five years in prison–eight months of it in solitary confinement. In […]

Tags: , , , , , ,

Posted in: Social Engineering | Add a Comment

The Enemy Within The Firewall

I’ve seen similar figures from other organisations and countries, so the stats don’t surprise me. My peers and I have always called this Armadillo security, hard on the outside, soft on the inside. Firewall, IDS, etc…all protecting the exterior of the network, only edge devices, nothing inside, not much policies, not much privilege segregation, anyone […]

Tags: , , , ,

Posted in: General News, Social Engineering | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·