Tag Archives: computers

PODCAST: Physical Pen-testing with Jek Hyde

Jek-Hyde-baby-bump-pic-bathroom-1Guest Jek Hyde of Sincerely Security with prosthetic “baby bump.”

My guest this episode is “Jek” a social engineer/pen-tester who recently live tweeted a real world penetration test in which her team successfully breached a client’s corporate offices and networks. We talk about how she got into social engineering and information security. It was fun to learn about her experiences and pick up a few tips and tricks as I prepare for the Social Engineering Capture The Flag competition at DEFCON next week!

Tagged , , , , , , , , , , , , , , , , , , ,

BrightTALK webinar: Google Docs Phishing Scam

What-is-google-docs-phishing-slide-2

ICYMI: I moderated a BrightTALK webinar on the recent Google Docs phishing attack.

Join BrightTALK and check out this informative panel discussion featuring myself along with panelists Nathan Wenzler and Kowsik Guruswamy.

This slideshow requires JavaScript.

A massive phishing campaign targeting Google accounts ripped through the internet on a Wednesday afternoon in early May. Phishing scams are pretty common. What sets this scam apart is that it is more convincing than most. The email takes users who click on the file to a legitimate Google sign-in screen to grant permissions. If you received the email or are concerned you might be targeted next, join this interactive Q&A panel to get the facts and protect your account and your organization.

We discuss:
– What is the Google Docs email scam?
– How is this scam different from other phishing scams?
– What’s the deal with Eugene Pupov?
– Who’s at risk and how can you avoid being a victim?
– What can we expect in the future?

Moderator:
– Vince Tocce, Vince in the Bay Podcast

Speakers:
– Nathan Wenzler, Chief Security Strategist at AsTech Consulting
– Kowsik Guruswamy, CTO for Menlo Security

Follow me on Twitter!

Tagged , , , , , , , , , , , , , , , , ,

PODCAST: Jon Nichols

WVUsoldier1

Jon Nichols

Jon aka “@wvualphasoldier” is a security researcher, consultant, policy advisor and former US military PSYOP soldier. He served on and off the battlefield in Iraq and Afghanistan. We discuss the recent Shadow Brokers auctioning of computer network exploits which are alleged to have been stolen from NSA linked security firm, Equation Group.

TOPICS INCLUDE: Shadow Brokers, Equation Group, NSA, PSYOP, atmospherics, military intelligence, deception operations, propaganda, patriot hackers, The Jester, ISIS, Junaid Hussain (aka TriCk), Edward Snowden, Zipa Dux, insider threat vs. outside attacker theories, attribution, @thegrugq, Takashi Shimura, Rashomon and more!

DIRECT MP3 DOWNLOAD

SUBSCRIBE ON iTUNES

Tagged , , , , , , , , , , , , , , , , , , , , , ,