Social Engineering
25 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by OSINT
Scoop.it!

Visual Hacking is High Tech Shoulder Surfing

A visual hacker can infiltrate you—from the outside in. Quite literally, a person (ranging from a snoop to a cyber criminal) can peer over your shoulder while you’re using your […]
more...
No comment yet.
Scooped by OSINT
Scoop.it!

PROPAGANDA / SOCIAL ENGINEERING AND THE MANUFACTURING OF HUMAN THOUGHT

Propaganda is the act of deliberately spreading false or deceptive information, ideas, rumors, doctrines or principals propagated by an organization or movem...
more...
No comment yet.
Rescooped by OSINT from High Technology Threat Brief (HTTB) (1)
Scoop.it!

Syngress Publishing – No Tech Hacking – A Guide To Social Engineering, Dumpster Diving And Shoulder Surfing | iHackers

Syngress Publishing – No Tech Hacking – A Guide To Social Engineering, Dumpster Diving And Shoulder Surfing | iHackers | Social Engineering | Scoop.it
#Syngress Publishing - No Tech Hacking - A Guide To Social Engineering, Dumpster Diving And Shoulder Surfing http://t.co/GT7WwC88...

Via Daniel A. Libby, CFC
more...
No comment yet.
Scooped by OSINT
Scoop.it!

Visual Hacking is High Tech Shoulder Surfing

Visual Hacking is High Tech Shoulder Surfing | Social Engineering | Scoop.it
A visual hacker can infiltrate you—from the outside in. Quite literally, a person (ranging from a snoop to a cyber criminal) can peer over your shoulder while you’re using your computer or mo...
more...
No comment yet.
Rescooped by OSINT from Internet in the news
Scoop.it!

So, You Want to Evade Government Censorship and Spying ...

So, You Want to Evade Government Censorship and Spying ... | Social Engineering | Scoop.it
Around the world, 20 percent of internet users contend with online censors, often sidestepping the intrusion with a variety of innovative tools

Via Internet Society
more...
Kelsey Stuhler's curator insight, December 2, 2014 9:48 AM

This article "So, Your Want to Evade Government Censorship and Spying..." offers insight on how individuals in other countries that have experienced a "creep" in censorship, can avoid the block of information. Author Mark Hay states that eventually the government won't be able to control censorship.That's promising, but for now, individuals are struggling to live in countries that threaten their freedom if they break their laws. One of the photo's attached to there article displays a banner in Thailand that states that "sharing" or "liking" can get them jailed.

 

"If a government really wants to spy on you, there’s very little you can do to avoid that snooping, especially if they’ve coerced or cajoled your service providers into giving the information you send over the internet." This is what I have been focusing on all semester. I think that it's pointless to stress on factors that we cannot control. Unless you're planning a murder on your computer and googling "how to suffocate a woman", I don't think anyone has to worry about the government spying on them -- in the US at least. For other countries, the government spying on them of course has worse consequences because they have stricter laws. 


Some of the tactics that Mark Hay presents in this article about finding ways around censorship are to "download a virtual private network or TOR browser to reroute your traffic through remote, secure servers and networks." I'm sure individuals in other countries are aware of these loopholes, but many may be in fear of the authorities coming after them if they do this. He also says that VPNs are the ultimate source of censorship evasion. But, the powerhouse, China has even been able to tamper with those and found ways to still block their country from navigating the loopholes. They have ways to keep track of their 640 million internet users. It's absolutely insane. 


Although this article is presenting the hardships of individuals living in other countries. I think that there is a good sense of hope for individuals living in fear of censorship. "With tools like these, you can be sure that even for the 20 percent of the world living under censorship, the web can still be a free and vibrant place. In the long run, governments will not be able to stop it, no matter how they try."



Scooped by OSINT
Scoop.it!

Kali Linux Social Engineering Toolkit TCP Reverse Meterpreter

Using Kali Linux Social Engineering Toolkit, this is a Secure Guard Consulting demo of a Java Applet exploit and TCP Reverse Meterpreter payload attacking a ...
more...
No comment yet.
Rescooped by OSINT from High Technology Threat Brief (HTTB) (1)
Scoop.it!

Am I A Victim? - Reverse Social Engineering (Not Necessarily the IT Security Definition, But Close)

Am I A Victim? - Reverse Social Engineering (Not Necessarily the IT Security Definition, But Close) | Social Engineering | Scoop.it
About a year or two ago, someone used my Gmail address to sign up for Facebook. My GMail address had been my go-to spam email. (since I got my Google phone, it's become my primary email and my doma...

Via Daniel A. Libby, CFC
more...
No comment yet.
Scooped by OSINT
Scoop.it!

Social Engineering in 2 Minutes

Safelight shows you how to recognize signs of social engineering... in two minutes. http://www.safelightsecurity.com/security-training/information-security-a...
more...
No comment yet.
Scooped by OSINT
Scoop.it!

The TREsPASS Project | Social Engineering Award

The TREsPASS Project | Social Engineering Award | Social Engineering | Scoop.it
RT @TREsPASSProject: The deadline of the TREsPASS social engineering award has been extended until December 15th. http://t.co/o6ZHP2A89L
more...
No comment yet.
Scooped by OSINT
Scoop.it!

Reverse Social Engineering

An example of reverse social engineering (creating a problem to have the target reach out to you to solve the problem which allows you access). From the movi...
more...
No comment yet.
Scooped by OSINT
Scoop.it!

Art of Human Hacking: Social Engineering -

Art of Human Hacking: Social Engineering - | Social Engineering | Scoop.it
In this blog, we are going to talk about social engineering attacks and we can start by discussing, “What is social engineering?” and the techniques which real-time hackers use for social engineering.
more...
No comment yet.
Scooped by OSINT
Scoop.it!

This Is Your Face To Facebook: Creepy Data Masks Show The Monstrous Side ... - Co.Create

This Is Your Face To Facebook: Creepy Data Masks Show The Monstrous Side ... - Co.Create | Social Engineering | Scoop.it
To Facebook, our facesour livesare merely billions of data points.
more...
No comment yet.