Skip to main content

Digital Trends may earn a commission when you buy through links on our site. Why trust us?

Social-Engineer LLC celebrates fifteen years of phishing for security and awareness

Information Security with mouse cursor on screen for Social-Engineering LLC article - Pexels
Pexels

Social-Engineer LLC is proud to celebrate its fifteenth year of success in the information security (InfoSec) industry. Founded in 2010 by CEO Christopher Hadnagy, the company specializes in applying its patented and scientifically verified process to train and educate customers against the growing danger of InfoSec attacks like phishing, vishing (voice phishing), SMiShing (SMS phishing), and physical infiltration. Their services range from providing simulated attacks to tiered training courses in protecting individuals, corporations, and institutions.

After being expelled from college when he attempted an experimental war-dialing program, Chris Hadnagy explored a wide variety of careers before he settled on his true passion in InfoSec services. When he founded Social-Engineer, Chris built a process so unique in its ability to effectively raise security awareness that he patented it before sharing his services with the world.

This methodology was influenced by his observations of how scammers have operated throughout history. Chris uses the example of Victor Lustig, the only man to have scammed Al Capone and lived to tell the tale. The con that brought him fame was selling the Eiffel Tower – which was not for sale at the time – at least twice. Lustig used the principles of social engineering before the name was coined. “Reading the different strategies that conmen used, the biggest commonality was their ability to exploit fear,” explains Chris.

The behavioral psychology behind social engineering attacks

Chris has developed an extensive albeit informal education in behavioral psychology during his time in the industry. In fact, he was one of the first to formally define social engineering in his book Social Engineering: The Art of Human Hacking. His second book – Unmasking the Social Engineer: The Human Element of Security – was co-authored by the pioneering psychologist of human facial expression, Dr. Paul Ekman. Chris’ intimate pedagogy of the ins and outs of social engineering lies behind his methodology. “Fear triggers the amygdala and shuts down your frontal cortex,” Chris explains, “When that happens, you no longer can make rational decisions, and start acting from your limbic system. So, when you pick up the phone and someone’s fear-based threats to get very personal or financial information, you end up giving up with little resistance.”

One successful ‘pretext’ they used in their simulated vishing attacks was an employee in labor. “Our brilliant callers would call a client’s employee claiming that she was about to give birth, and if she didn’t get the account password changed, no one would get paid. She would pretend to go into labor on the call, and this manufactured sense of scarcity and time constraints would stress the person on the other end out so much that, even with resistance, they cave and change the password,” Chris recalls.

“We use the technology that bad guys are using to hurt us, to help us.”

Chris became a leader of the social engineering space by resolving the blurry legality of using manipulative techniques for simulated attacks. Chris and Social-Engineer carefully developed an ethical code of conduct that’s been widely implemented. “Manipulating fear and exploitation is certainly difficult to make ethical, but our methods only utilize pretexts that add pressure that does not threaten the employee’s livelihood or well-being,” he explains.

Since its patented phishing process in 2010, Social-Engineer has also instituted its original Instant Vishing Education System (IVES) as its post-attack protocol. Social-Engineer’s simulated attacks aim not to catch people in their vulnerabilities, but to educate them to report suspicious activity.

Social-Engineer: A rise to prominence within the InfoSec industry

During these last fifteen years, Social-Engineer has established itself as a leading company in InfoSec through its mass-vishing programs, making thousands of monthly calls to seek out and educate clients on the vulnerabilities of their organizations. Chris Hadnagy has released several other books since his first bestseller. His latest book goes beyond the InfoSec industry. Human Hacking: Win Friends, Influence People & Leave them Better Off for Having Met You, is a transformative guide that reveals how to ethically influence others using psychological insights, helping you build genuine relationships that positively impact everyone you meet.

“When you pick up the phone and someone’s fear-based threats to get very personal or financial information, you end up giving up with little resistance.”

Additionally, they have launched a three-tiered training course on ethical social engineering. The Foundational Application of Social Engineering (FASE) course is open to everyone and educates students on the psychology of human decision-making. Following their foundational course, the Practical Application of Social Engineering (PASE), the students learn how to plan, develop, and launch real-life attacks against actual targets. Finally, for those who have been successful in previous courses, Social-Engineer provides its certified Master’s Level Social Engineering course (MLSE) which is a 5-day live social engineering and red team course. Higher-level courses involve interactions with unknowing participants and compelling storylines for students to test their skills in real-life contexts.

Social-Engineer aims to lead the industry even further into effectively protecting customers against an evolving underworld of information security attacks. Currently, the company is using its database of vishing attacks to train an AI model to accurately detect deception in hybrid cybersecurity attacks. As Chris explains, “We use the technology that bad guys are using to hurt us, to help us. We will continue to grow in our abilities to educate people on effective security awareness.”

Digital Trends partners with external contributors. All contributor content is reviewed by the Digital Trends editorial staff.
Chris Gallagher
Chris Gallagher is a New York native with a business degree from Sacred Heart University, now thriving as a professional…
Kobizo leads the way in climate tech solutions for a sustainable future
wind turbines and climate tech by karsten wurth from unsplash

The climate crisis remains a global issue that demands innovative solutions. The digital transformation sweeping across industries worldwide offers new opportunities to address the environmental challenges the crisis brings. Kobizo, an energy technology consultancy based in Germany, stands at the forefront of driving the energy transition. It aids clients in achieving their climate targets through advanced software solutions, aligning with its vision to explore and develop technologies to serve people and assist them in overcoming all borders.

 
How Kobizo aids clients in achieving their climate targets
The company, dedicated to providing borderless tech solutions, has recognized a gap in the market where traditional business practices and emerging climate tech innovations need to converge. Technologies like artificial intelligence (AI), the Internet of Things (IoT), and cloud computing set new standards and enable groundbreaking innovations. Kobizo is committed to contributing to the sustainable development of society through the responsible and creative application of these technologies. Simultaneously, stakeholders (i.e., clients, partners, and investors) prioritize social responsibility and eco-friendly products and services.
“The climate crisis is reshaping markets and consumer behavior,” supplies Dr. Keon Nguyen, the Founder and CTO. “It imposes new demands on businesses, and we made it our mission to help businesses adapt and thrive in this changing space.”
Kobizo offers cutting-edge services supporting businesses in managing their environmental impact, complying with stringent regulatory requirements, and reporting their corporate social responsibility (CSR) efforts. It offers Net Zero management for companies seeking to monitor and reduce their carbon footprint.

Read more
Boost business integrity with AI Detectors: Guard your brand from AI risks
AI detector and Google Deep Mind visualization from pexels

As the decade progresses, artificial intelligence (AI) becomes integral in business operations. With AI venturing into content creation, companies must maintain their integrity. AI Detector, a reliable AI content checker, could be the defining factor for your business in authentically identifying and managing AI content.

 
The significance of content integrity
Content integrity is the process of verifying that a business’s content or data remains accurate and consistent throughout its lifecycle. Organizations should maintain content integrity to establish authenticity, credibility, and trust in their online content.

Read more
Your new ultimate cell carrier: $10 per month 5G coverage from RedPocket Mobile
Woman smiling at phone used for RedPocket Mobile article.

High-quality cell service is no longer a luxury — it’s essential for navigating and thriving in the modern world. But the problem is that the nation’s biggest service providers have taken advantage of this fact. They know that it’s no longer a mere convenience, and they charge an arm and a leg for even their most basic service tiers, knowing that their customers have no choice but to fork over their hard-earned cash.

While low-cost service providers have attempted to provide a cheaper option, they all share similar problems, whether it’s spotty service, frequent price increases, or terrible customer service.

Read more