Hacker And The Fed cover image

Social Engineering & "Vishing"

Hacker And The Fed

CHAPTER

Social Engineering - How to Build a Profile Through Email

"I found the IP for the server internally in the emails," he says. "It was easy for me to kind of exploit that personal relationship, which is what makes social engineering so effective" It highlights importance of having a security policy, even with friends and family, she adds.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner