
Social Engineering & "Vishing"
Hacker And The Fed
Social Engineering - How to Build a Profile Through Email
"I found the IP for the server internally in the emails," he says. "It was easy for me to kind of exploit that personal relationship, which is what makes social engineering so effective" It highlights importance of having a security policy, even with friends and family, she adds.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.