paint-brush
How Social Engineering is Used to Bypass Your Security...with Easeby@nathan-house
957 reads
957 reads

How Social Engineering is Used to Bypass Your Security...with Ease

by Nathan House9mAugust 4th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Nathan House is the founder and CEO of Station X a cyber security training and consultancy company. The social engineer uses influence and persuasion in order to deceive, convince or manipulate. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology. The following is an example of a previous job I performed for a client. It demonstrates what seemed like insignificant information can build trust with people and compromise a company. This has been provided as further reading for an interview I did on penetration testing and social engineering for PC Extreme magazine.

Company Mentioned

Mention Thumbnail
featured image - How Social Engineering is Used to Bypass Your Security...with Ease
Nathan House HackerNoon profile picture
Nathan House

Nathan House

@nathan-house

Nathan House is the founder and CEO of Station X a cyber security training and consultancy company.

Learn More
LEARN MORE ABOUT @NATHAN-HOUSE'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Nathan House HackerNoon profile picture
Nathan House@nathan-house
Nathan House is the founder and CEO of Station X a cyber security training and consultancy company.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here