Teaching Social Engineering. Thing to Keep in Mind

you.com AI responded with the following list of how people learn: Spatial Thinkers – Visualize relationships and mentally “map” information Experiential Learners – Learn by doing (trial, error, iteration) Sequential Thinkers – Prefer logical, step-by-step processes ️Visual Learners – Diagrams, color-coding, visuals Social Learners – Dialogue, feedback, collaboration Reflective Learners – Need time to process … Read more

More Browser Problems!

First couple of paragraphs in Dark Reading story says it all: Both the Google Chrome and Mozilla Firefox browsers currently are under separate attacks, the former from actors exploiting a zero-day bug and the latter from a list of malicious extensions that are actively compromising users. Google rushed out a stable channel update on Monday … Read more

Do you have a Wifi alarm clock?

iank.org says they have serious flaws specifically the Loftie alarm clock This is apparently in the alarm clock file structure: $ strings config.arm64_v8a.apk … assets/icons/clock.svg _setClient@91206165 _TapStatusTrackerMixin@113288344 https://fwbek2lb0a213kbewqoit.byloftie.com/Loftie_EVT.bin # <——- get:digitMatcher ListTileThemeData get:endOfFrame _drawPicture@15065589 … If you notice the weird address in the file: fwbek2lb0a213kbewqoit.byloftie.com This kind of programming is not a good idea.  her … Read more

Botnet Takes Advantage of Cheap IoT Devices

Yes I am assuming IoT devices from china are ‘cheap’. Look at this FBI IC3 headline: Home Internet Connected Devices Facilitate Criminal Activity probably important to know – what is the Botnet? “BADBOX 2.0 was discovered after the original BADBOX campaign was disrupted in 2024. BADBOX was identified in 2023, and primarily consisted of Android … Read more