Hacking People: No Mask Required


The Blog of Tom Webster

Abstract

Another big social engineering attack just scammed someone out of another Twitter username, and it seems we haven't quite learned our lessons from Mat Honan's earlier case. Why is social engineering still and issue? Haven't we been dealing with this for decades? This talk is about Social Engineering, the high level overview, some quick history, recent hacks, and lessons we can take with us.

Bio

Tom Webster is an IT grunt, VPN admin, Security Lead, Programmer, and general tech guy at BWI Group. He's constantly breaking, fixing, and researching things as well as ranting over at SamuraiLink3.com and his Google Plus profile. Tom has a secret love of cooking while wearing Google Glass and can make a damn good pot roast.

Downloads/Embeds

You can download this whole talk, images, fonts, and all source materials right here.

If you'd like to embed this talk (like I did on this page), head over to this talk on SpeakerDeck to see PDF download options, embed code, and other cool stuff.

Credits

Articles

Software

Colors

Fonts

Image Credits

All images are either under a CC license or used with fair use.

QR Codes

Generated at QR Code Artist

Glyphicons Free

Author: Glyphicons

License: CC BY 3.0

Jason

Author: Paramount Pictures

License: Fair Use

I made edits to cut out the character.

Mitnick

Author: Unknown, found on View Syntax

License: Fair Use

Frank Abagnale (cropped)

Author: Marcus JB

License: CC-BY-2.0

Converation

Author: Tim RB

License: CC BY-NC-ND 2.0

CatchMeIfYouCan

Author: DreamWorks

License: Fair Use

Engineering

Author: Bill Burris

License: CC BY-SA 2.0

Honan

Author: Photo: Ariel Zambelich/Wired. Illustration: Ross Patton/Wired

License: Fair Use

Hiroshima

Facebook Profile Picture

Author: Naoki Hiroshima

License: Fair Use