Sponsored by Keepnet Labs

Tag - Learn Social Engineering

Forensic

Forensic investigation of a Social Engineering attack

Forensic investigation of a Social Engineering attack In this article I am going to share with you a real Social Engineering attack , where we worked in a case to investigate if there was any forensic evidence to suggest that the laptop computer a) had been compromised by the perpetrator(s), b) if found to be compromised, how, when, and by whom [...]


Kevin Mitnick Recommends Erdal Ozkaya

Kevin Mitnick recommends Learn Social Engineering by Erdal 0zkaya

Kevin Mitnick recommends Today I have received an Feedback which made me very happy. One of the very first known Social Engineer' s or Worlds Most known hackers Kevin Mitnick is recommending my book "Learn Social Engineering" in his sessions , conferences as per this e-mail : "Good Morning (or) Afternoon,  Dr... Hope you are well in the middle of this pandemic. My [...]


30 Cybersecurity Books to deepen your knowledge by Auth0

Deepen your knowledge : 30 Cybersecurity Books by Auth0    I am really happy to see that my book Learn Social Engineering is recommended as 1 of 2 Social Engineering books by the popular blog / twitter account Auth0  Did you read Learn Social Engineering yet ? Deepen your knowledge : 30 Cybersecurity Books Dr ozkaya 30 Cybersecurity Books to deepen your knowledge by [...]


Information Gathering Methods

Information Gathering Methods

Information Gathering Methods Information gathering is not as challenging as it used to be a few years ago when one would only get details about a target either directly from the target or from asking around. The internet, more specifically the use of social media, has simplified this stage with newer and faster techniques of data collection. In the process [...]


Foreword by Troy Hunt

Foreword by Troy Hunt , Founder of Have I Been Pwned – thankful

Foreword by Troy Hunt - Founder of Have I Been Pwned I remember precisely where I was when I first saw Erdal talk about social engineering: it was a jam-packed room at Microsoft’s TechEd, overflowing into the hallway if memory serves me. Software developers and IT pros alike had flooded into the room to hear about this phenomenon which sounded [...]


Cybersecurity Canon Candidate Book Review

Cybersecurity Canon Candidate Book Review: Learn Social Engineering ;0

Cybersecurity Canon Candidate Executive Summary Learn Social Engineering: Learn the art of human hacking with an internationally renowned expert will equip you with a holistic understanding of social engineering. It will help you  avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics ranging from baiting, phishing, and spear phishing, [...]


Zombies in Social Networks Erdal Ozkaya

Zombies in Social Networks –

We have arrived in a time where social networks have become an essential part of our lives. People are spending a great deal of time to connect with organizations, businesses, and individuals all over the world. But there is a dark side to social networks. How do you protect your business or yourself from zombies, bullies, hackers, scammers, stalkers [...]