Tag - Social Engineering

social engineering attack demo

The aftermath what follows a social engineering attack? 2 Great real life examples :

The aftermath what follows a social engineering attack? There are multiple types of endpoint setups that you may encounter when responding in the aftermath of a social engineering attack on a given network target. The victim may be targeted for pwning inside a browser—a cloud-only attack; the victim may be targeted on a workstation/end user home system, or the victim may...

What is Social Engineering

What is Social Engineering ? ( free guide to SE 101 )

What is Social Engineering Social Engineering is, involving clever manipulation of the natural human tendencies of trust to obtain information to help facilitate fraud, network intrusion, industrial espionage, and identity theft or network/system disruption. I do like also the definition from Bruce Schneier: “Amateurs Hack Systems, Professional hack People” To gain the trust of the people Social Engineers trick their victims with...


Forensic investigation of a Social Engineering attack

Forensic investigation of a Social Engineering attack In this article I am going to share with you a real Social Engineering attack , where we worked in a case to investigate if there was any forensic evidence to suggest that the laptop computer a) had been compromised by the perpetrator(s), b) if found to be compromised, how, when, and by whom it...

The Art of Human Hacking with Dr ozkaya

The Art of Human Hacking – Join us for Free Breakfast Event 11/19

The Art of Human Hacking If you in Ankara do not miss out the Free BreakFast Event and exclusive Book Signing event for my brand new books: The Art of Human Hacking Getting Started with Cybersecurity I will also deliver a session about Phishing Attacks right after Keepnet Labs Turkey Country Manager Erdnic We are looking forward to seeing you there   When : 18 November 2019 Where:...

Inside The Dark Web Dr Ozkaya

Inside the Dark Web , my new book is just released (2019)

Inside the Dark Web Summary Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. The book also analyzes the online underground economy and digital currencies and cybercrime on the dark web. The book further explores how dark web crimes are conducted on...

Social engineering

Prevent Social Engineering easily and free

Prevent Social Engineering We call social engineering, the deception art. It is, simply, capturing information by deceiving/manipulating the target person. There are several ways to do this. For example, a fake message that you have sent to someone to hack his/her email is a simple way of social engineering, or an email or SMS saying, You have earned $500 constantly, is meant to deceive you. News about celebrities, for...

Information Gathering Methods

Information Gathering Methods

Information Gathering Methods Information gathering is not as challenging as it used to be a few years ago when one would only get details about a target either directly from the target or from asking around. The internet, more specifically the use of social media, has simplified this stage with newer and faster techniques of data collection. In the process of...

Foreword by Troy Hunt

Foreword by Troy Hunt , Founder of Have I Been Pwned – thankful

Foreword by Troy Hunt - Founder of Have I Been Pwned I remember precisely where I was when I first saw Erdal talk about social engineering: it was a jam-packed room at Microsoft’s TechEd, overflowing into the hallway if memory serves me. Software developers and IT pros alike had flooded into the room to hear about this phenomenon which sounded so...

Learn Social Engineering with Dr Erdal Ozkaya Foreword by Troy Hunt

25 Best Social Engineering Books of All Time

25 Best Social Engineering Books of All Time Learn Social Engineering made it to the Best New Social Engineering Books I'm happy to announce that my book, "Learn Social Engineering", made it to BookAuthority's Best New Social Engineering Books: BookAuthority collects and ranks the best books in the world, and it is a great honor to get this kind of recognition. Thank you for...

Keynote MFA Turkey 2018

Keynote MFA Turkey It was an honor to present to the MFA staff, Ministers and Turkish consulates from all over the world about the importance of Cybersecurity and SocialEngineering. On behalf of Microsoft & myself I would like to thank them for their great hospitality. https://www.erdalozkaya.com/?s=feedback