Getting Smart on Social Engineering

Human hacking — commonly referred to as ‘social engineering’ — predates computers. How can you avoid being manipulated into disclosing information that should be kept close to the vest?

“Human hacking” predates computers. (Source: Getty Images)

Bad actors are clever at always finding innovative ways to extract that information from us, by capitalizing on one of the foundational traits of human nature: Trust.

Professional human hacker. (Source: Giphy)

How Social Engineering Takes Place

When It Becomes Personal

There was a 350% YoY increase in inbound phishing emails (Source: Microsoft Office 365 Threat Research)

The Real World

Before putting on the belly and after. (Credit: Jek Hyde)
Finders keepers? (Source: Giphy)

Conclusion

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Rey Bango

Tinkering in cybersecurity at Veracode and helping developers build secure software. Fortis Fortuna Adiuvat. Opinions are mine.