Information operations · Information Warfare · social engineering

A very modern honey trap: Mia is 30, alluring and looking for love. No wonder middle-aged executives fell for her. There’s just one HUGE problem…


Honey-trappers are posing as beautiful women online to talk to vulnerable men In Mia Ash’s situation, the profile was used to steal corporate and strategic plans The internet appears to offer a new level of persuasion to honey-trappers The techniques bear close similarities to those used by spies trawling for secrets By John Naish for the… Continue reading A very modern honey trap: Mia is 30, alluring and looking for love. No wonder middle-aged executives fell for her. There’s just one HUGE problem…

Cybersecurity · Information operations · Information Warfare · social engineering

MEET MIA ASH, THE FAKE WOMAN IRANIAN HACKERS USED TO LURE VICTIMS


Meet Mia Ash, the Fake Woman Iranian Hackers Used to Lure Victims ANDY GREENBERG 07.27.17 10:00 AM MIA ASH IS a 30-year-old British woman with two art school degrees, a successful career as a photographer, and plenty of friends—more than 500 on Facebook, and just as many on LinkedIn. A disproportionate number of those friends happen to be… Continue reading MEET MIA ASH, THE FAKE WOMAN IRANIAN HACKERS USED TO LURE VICTIMS

social engineering

The life of a social engineer: Hacking the human


Mirko Zorz – Editor in Chief May 19, 2016 A clean-cut guy with rimmed glasses and a warm smile, Jayson E. Street looks nothing like the stereotypical hacker regularly portrayed in movies (i.e. pale, grim and antisocial). But he is one – he just “hacks” humans. Street is a master of deception: a social engineer, specializing… Continue reading The life of a social engineer: Hacking the human

Information operations · OPSEC · social engineering

Request for Information: Social Engineering using Social Media


Does anyone know an example(s) of Social Engineering using Social Media?  +1 if it was somehow connected with a Foreign Intelligence Service… This question is precipitated by a ‘Navy Captain’ requesting me as a contact on LinkedIn.  If he is authentic, then he is very senior.  I asked a number of our ‘mutual contacts’ and… Continue reading Request for Information: Social Engineering using Social Media

Computer Security · Cyber Crime · cyber security · Cybercrime · Cybersecurity · Hackers · Information operations · Physical Security · social engineering

Are YOU Cyber savvy?


Most people lack computer user education, plain and simple. Most people turn on their computer, sigh when they have to enter their password (if they have one at all) and start using their computer to read email, cruise through their favorite website, do some online shopping and perhaps banking. They might watch videos, read some… Continue reading Are YOU Cyber savvy?

Computer Security · Cyber Crime · cyber security · Cybercrime · Cybersecurity · cyberwar · Information operations · social engineering

Mitnick’s Tale Sheds Light on Social Tactics – Dark Reading


Mitnick’s Tale Sheds Light on Social Tactics – Dark Reading. Lesson from the past: Targeted companies need good security processes to protect their data.  Excellent blog article.  Kevin Mitnick was a very good hacker but he was an even better social engineer.  We ALL need to be aware what he did, how and why…  because… Continue reading Mitnick’s Tale Sheds Light on Social Tactics – Dark Reading