Archive for the ‘social engineering’ Category

Social Engineering Red Flags

Social Engineering Red Flags 22 Social Engineering Red Flags We recommend EVERYONE to review the 22 social engineering red flags to watch out for in any email. It might be a good idea to print out this PDF and pass it along to family, friends, and coworkers. Remember to always think before you click!  Subscribe […]

Leave a Comment

Social Engineering: An essential book and must have competency

Chris Hadnagy has a website on the topic of Social Engineering and assisted in developing Social Engineering Toolkit (SET). This topic and knowledge apply to every person who keep sensitive information and organization who want to protect private information leakage into public domain via people. If you are interested in knowing the art of social […]

Leave a Comment


“MK-ULTRA” PSYCHOLOGICAL WARFARE CIA Mind Control Operation MK-ULTRA PSYCHOLOGICAL WARFARE . Mirrored. Documentary: The Most Dangerous Game. Interesting documentary on brainwashing and psychological warfare. CIA. Psychological Warfare (WWII Era Reprint) Mind Control: The Ancient Art of Psychological Warfare Ideas as Weapons: Influence and Perception in Modern Warfare Psychological Warfare and the New World Order: […]

Comments (1)

Facebook Account Hack: Spam 80,000 friends

by Sandy Sidhu Social media is hot. 140 characters is the way to communicate these days and it’s not unusual to hear someone say, “I have 3000 friends.” We often hear about the success stories, but what about the unsuccessful ones? Take Jonathan Emile, a Montreal-based hip-hop artist, who has made his living building a […]

Leave a Comment

Social Engineering: The Art of Human Hacking

“Social engineering” as an act of psychological manipulation was popularized by hacker-turned-consultant Kevin Mitnick Social Engineering: The Art of Human Hacking Christopher Hadnagy, Author The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and […]

Leave a Comment