
Reconnaissance for Social Engineering: Tales from the Road
Social engineering reconaissance When it comes to reconnaissance and open source intelligence, research often seems like a digital battle. Using endless pieces of software, sites […]

Webinar: Think like a hacker
We recently did a webinar with APMG on why you need to think like a hacker. They have uploaded it here: https://apmg-international.com/events/why-you-need-start-thinking-hacker

Can I borrow your swipecard?
This case involves an accountancy firm based in South East England. The firm had just lost a big client and as a result had to make some cuts which included letting a few members of staff go.

Stay calm and (don’t) pay the hackers
This social engineering case study highlights how attackers can use curiosity, urgency and fear to manipulate victims into breaking company protocols and get a finance employee to willingly transfer £152,000 into the attackers bank account.

The enthusiastic law student
This case involves a law firm based in the south of England. The firm was of a reasonable size and, like most law firms, held a lot of very sensitive customer data.

Criminal Justice Evolution podcast
Patrick Fitzgibbons was kind enough to invite me on to his US based Criminal Justice Evolution podcast. We talked about the social engineering threats facing […]

The not-so-secret life of boarding passes
Have you ever thought about what your boarding pass might say about you? I don’t mean “oh look at me, I’m flying in Emirates Business Class”, but what data you might be leaking publicly on that anachronistic piece of paper you discard in the seat in front of you. Turns out it is an awful lot more than you think…

The Prisoners Dilemma and Intelligence sharing
Cybercrime is increasing year on year. The 2017 cyber breaches survey shows that almost half of UK firms have been hit by cyber breach or […]

Equifax Leak
In the latest in a truly blockbuster year for data leaks, American credit reporting company Equifax has announced the loss of highly sensitive data belonging […]