How I Got Network Creds Without Even Asking: A Social Engineering Case Study Jen Fox

On a professional pen testing engagement,why is one call or phish pretext selected over another? Why does it work (or not)? This case study describes how an SE pen testing engagement used a combination of exploits – phishing, vishing, and a spoofed site to successfully gain network credentials without even asking for them. Learn why … Read more

But Can They Hack?: ExaminingTechnological Proficiency in the US Far Right Tom Holt

Research surrounding radicalization to and use of violence among extremist and terror groups has expanded over the last decade. These studies have improved our understanding of the potential process of radicalization and identified differences between lone wolf and group-based extremist threats. There are still fundamental questions that must be addressed, particularly regarding the role of … Read more