Social Engineering Blogs

An Aggregator for Blogs About Social Engineering and Related Fields

The Security Dialogue Blog February 24, 2014

DEF CON 16 – Eric Schmiedl: Advanced Physical Attacks by DEFCONConference

Your stack is smash-proof. Your dumpster is fully alarmed. And your firewall is so secure that it has former Soviet officials green with envy. So why are the developers finding their undocumented features in competitors’ products, or company executives on a constant hunt for leaks and traitors? There’s a whole lot more to doing an end-run around network security than calling up and pretending to be the help desk or hoping someone chucks a service manual in the trash Professional attackers with specific targets have a whole rash of techniques — from using targeted employees to hiding microphones — adopted from the world of espionage, and this talk is all about how they do what they do. Eric Schmiedl has spoken on access control systems at BlackHat 2007 and safecracking at DEFCON 14. He is a member of the TOOOL.US Board of Directors, maintains a semblance of an undergraduate career at the Massachusetts Institute of Technology, and has been picking locks all his life. For copies of the slides and additional materials please see the DEF CON 16 Archive here: http://ift.tt/1mDLlZ8

Filed Under: Uncategorized

The Security Dialogue Blog February 24, 2014

DEFCON 14: An Analysis of Current and Emerging Threats to Physical Security by Christiaan008

Speakers: Marc Weber Tobias, Investigative Law Offices, Security.org Matt Fiddler, Security Consultant – Security.org Although there has been a significant amount of attention paid to the topic of late, there are complexities that must be understood to accurately gauge the impact of “Bumping Locks” on physical security. This talk will explore the vulnerabilities and exposures of virtually all pin-tumbler locks, highlighting the legal issues surrounding the possession and use of bump-keys and bumping implements. Case examples and demonstrations detailing a major security flaw and vulnerability in locks used by the federal government and a private sector corporation that affect millions of users will be presented. For more information visit: http://bit.ly/defcon14_information To download the video visit: http://bit.ly/defcon14_videos

Filed Under: Uncategorized

The Security Dialogue Blog February 24, 2014

Tactical Walls: Covert Arms Storage

Filed Under: Physical Security, Security

  • « Previous Page
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 15
  • Next Page »

About

Welcome to an aggregator for blogs about social engineering and related fields. Feel free to take a look around, and make sure to visit the original sites.

If you would like to suggest a site or contact us, use the links below.

Contact

  • Contact
  • Suggest a Site
  • Remove a Site

© Copyright 2025 Social Engineering Blogs · All Rights Reserved ·