
Sign up to save your podcasts
Or
The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.
4.6
305305 ratings
The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.
1,971 Listeners
361 Listeners
628 Listeners
366 Listeners
183 Listeners
1,008 Listeners
311 Listeners
401 Listeners
928 Listeners
7,870 Listeners
171 Listeners
187 Listeners
76 Listeners
129 Listeners
158 Listeners