paint-brush
Several Social Engineering Tricksby@David_Balaban
1,748 reads
1,748 reads

Several Social Engineering Tricks

by David Balaban6mDecember 27th, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The article is intended for white hats, professional pentesters, and heads of information security departments (CISO) It is intended to share several methods of social engineering that can be used in targeted attacks. The need to rob banks with weapons has already gone. Email is enough to penetrate most organizations. However, in many, even big companies, old stereotypes are still present. They place great emphasis on physical security, considering digital less important. Security rules are always written post factum, and therefore they are inert and weakly protect against new threats.

People Mentioned

Mention Thumbnail
Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Several Social Engineering Tricks
David Balaban HackerNoon profile picture
David Balaban

David Balaban

@David_Balaban

L O A D I N G
. . . comments & more!

About Author

David Balaban HackerNoon profile picture
David Balaban@David_Balaban

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite