
Sign up to save your podcasts
Or


The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices
By N2K Networks5
1818 ratings
The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices

372 Listeners

651 Listeners

1,020 Listeners

33 Listeners

416 Listeners

8,059 Listeners

179 Listeners

314 Listeners

189 Listeners

74 Listeners

93 Listeners

15 Listeners

139 Listeners

8 Listeners