Source: Human Hacking Exposed 2: Identifying Social Engineering Attacks | Privacy PC
Stashed in: Hackers!, Phishing
Everyone should at one point go listen to a social engineer/hacker speak.
How People *Think* Facebook Connect Log‑in and Log‑out Work | crystal beasley
How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP) | Zero Hedge
Reporting From the Web’s Underbelly - NYTimes.com
De-Identification - a critical debate