
Sign up to save your podcasts
Or


The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.
By N2K Networks4.6
309309 ratings
The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.

187 Listeners

2,004 Listeners

6,019 Listeners

371 Listeners

374 Listeners

638 Listeners

1,021 Listeners

321 Listeners

414 Listeners

8,016 Listeners

178 Listeners

189 Listeners

74 Listeners

137 Listeners

171 Listeners