

69: Human Hacker
26 snips Jul 7, 2020
In this engaging discussion, Christopher Hadnagy, a renowned security consultant and master social engineer, dives deep into the world of human hacking. He shares thrilling tales from his career, including audacious infiltration attempts and the evolution of phishing tactics. Hadnagy emphasizes the vulnerabilities that arise from human interaction with technology and explores the fascinating dynamics of trust and deception. With insights on effective communication and security awareness, this conversation is a captivating look into the art of manipulating human psychology.
AI Snips
Chapters
Books
Transcript
Episode notes
George C. Parker's Cons
- George C. Parker sold New York City landmarks he didn't own, like Grant's Tomb and the Brooklyn Bridge.
- He exploited immigrants' unfamiliarity with the city, creating fake documents and a believable office setup.
Types of Phishing
- Consider two types of phishing: security awareness and penetration testing.
- Security awareness phishing educates employees, while penetration testing aims to compromise systems.
Effective Phishing Training
- Implement a layered phishing program with varying levels of difficulty.
- Keep messaging ethical and non-damaging to maintain trust and educational value.