Blog Posts Tagged with "Psychology"

Ebe141392ea3ebf96ba918c780ea1ebe

Sure, I'll be Your Unicorn

January 21, 2013 Added by:Wendy Nather

I was fascinated to read about the last year cancellation of the British Ruby conference due to the arguments that the speaker lineup lacked diversity. Other people have their own opinions on why we have this problem and what we should do about it...

Comments  (0)

E6fba550184963cb20ac46502a1fa1ee

Reflected Glory: Revealing one of my self-created social engineering tricks

December 11, 2012 Added by:Will Tarkington

What is reflected glory? To do this trick you need someone with a high social status that you can be associated with. It doesn’t have to be a close association just one that is known. You then simply state with authority your own opinion once the relationship has been recently established...

Comments  (0)

E6fba550184963cb20ac46502a1fa1ee

The Female Social Lever

November 16, 2012 Added by:Will Tarkington

In my ongoing expose on Social Engineering techniques I bring to you one of my favorites I call “The Female Social Lever.” A technique that takes advantage of social geometry and complex female group hierarchy. For this example we are going to use a party because it is where I developed this particular technique...

Comments  (0)

E6fba550184963cb20ac46502a1fa1ee

I lost my theory of mind… or Where my mind at?

November 13, 2012 Added by:Will Tarkington

Without the theory of mind everything that social engineers do or attempt to do would fail. The theory of mind is basically one’s ability to differentiate perspectives. From perspective comes intention, from intention comes reaction, and from reaction comes reward (or failure)...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Psychopathy Tweets: Too Many Statistics, Not Enough Proof of Concept

August 01, 2012 Added by:Infosec Island Admin

What I came out with, after many slides of numbers, was “nope not really”, which I pretty much had thought before. There are just too many variables to this type of venture and you would need to have a trained psychoanalyst to talk to the individual to determine whether or not they are a true psychopath...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Detecting Psychopathy via Tweets? A Flawed Premise...

July 25, 2012 Added by:Infosec Island Admin

It seems to me that more and more we are being collectively mined not only for our habits, but now our emotions as well as our psychological makeups. All of this could potentially be collated from numerous sources. I doubt we will ever be able to contextualize the human psyche just from internet datum…

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

The Biggest Attack Surface is US

May 30, 2012 Added by:Infosec Island Admin

As technologies advance and the human nature side of things continues to allow for strides in security as well as the inevitable setbacks, you will become the ultimate target of the easy score for data that could lead to compromise. After all, what do you think the real persistent threats rely on? Human nature...

Comments  (0)

71d85bb5d111973cb65dfee3d2a7e6c9

Phishing with PDF's and Why it Works

May 02, 2012 Added by:f8lerror

During many penetration tests the need to social engineer a target may be required. Let’s talk about something that completely relies on the user being conned into following the attackers instructions. The scenario is simple send the user a PDF form and have them submit the form...

Comments  (0)

1789975b05c7c71e14278df690cabf26

Mind Control Security Awareness

April 03, 2012 Added by:Pete Herzog

ISECOM's SmarterSaferBetter seminar teaches you to actively keep on re-filtering. Doing it right by being alerted to prompts is the best way to keep your guard up, because actively filtering your world is truly exhausting. And being tired is when we make security mistakes...

Comments  (4)

0a8cae998f9c51e3b3c0ccbaddf521aa

Psychology of Information Security - The God Complex

January 27, 2012 Added by:Rafal Los

I'm willing to bet that if you went down the list of all the security policies that your organization has, there would be at least a few that you break based on the 'this doesn't apply to me, I know better' principle. This is also know in psychology as the "God Complex"...

Comments  (4)

7fef78c47060974e0b8392e305f0daf0

Anonymous: Insidiae, Psychologia, Et Liber Pericula

September 20, 2011 Added by:Infosec Island Admin

Collectively, groups like Anonymous can manifest a sociopathic or psychopathic potential in certain circumstances. In the case of the actions of Anonymous actors online in their dialogues and statements, they manifest key features of what is considered psychopathic behaviors...

Comments  (3)

7fef78c47060974e0b8392e305f0daf0

The Psychology of “Neo Jihad” Radicalization

September 11, 2011 Added by:Infosec Island Admin

The AQ core will continue to reach out to the lonely and dispossessed to radicalize the newcomers as well as use the technologies we have created (privacy/hacking utilities included) to effect the outcomes they desire and we need to be able to counter them...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Identity Theft Has Long Lasting Psychological Effects

August 19, 2011 Added by:Robert Siciliano

The lack of specifics makes it difficult for victims to attain any closure and move forward. “No matter how well they monitor their financial records for the rest of their lives, they may still feel vulnerable,” Van Vliet says...

Comments  (0)

F7e202a206691e473e509d080620af68

Similarities Between Riots and Modern Internet Hacktivism

August 14, 2011 Added by:Lenny Zeltser

To understand riots, consider the importance of de-individuation of the mob's participants, the importance of instigating events and the role of the "entrepreneur" in starting the chain reaction of a riot. There are parallels to the dynamics of modern Internet hacktivism...

Comments  (3)

0a8cae998f9c51e3b3c0ccbaddf521aa

Weaponizing Cyberpsychology and Subverting Cybervetting

August 01, 2011 Added by:Rafal Los

In a talk to be shared for the first time at DEF CON 19, members from the UK based volunteer organization the OnlinePrivacyFoundation.org will share the results of their research on examining to what extent it is possible to determine someone’s personality through their Facebook activity...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Social Engineering: The Art of Human Hacking

March 16, 2011 Added by:Ben Rothke

Far too many people think that information security and data protection is simply about running tools, and too many technology books focus on the hardware and software elements, completely ignoring the human element. The social engineer can then use that gap to their advantage...

Comments  (0)

Page « < 1 - 2 > »
Most Liked