How To Hack A Human

  • 30 September 2014
  • 0 replies
  • 202 views

Userlevel 7
By Kelly Jackson Higgins  Posted on 9/30/2014
 
Social engineering expert and founder of the DEF CON Social Engineering Capture the Flag contest Chris Hadnagy joins Dark Reading Radio on Wednesday, October 1, at 1:00 p.m. EDT.
 It happens every day, several times a day: An end-user opens an email attachment or clicks on a URL in an email thinking it's legit -- or just out of curiosity -- and boom, malware infects his or her machine, and the attackers get a foothold into the victim's corporate network.
Duping users is just too easy, and that's what makes social engineering so pervasive and dangerous. Most cyber espionage campaigns and financial-stealing malware attacks start with a clever, and sometimes ridiculously simple, phishing email, which ultimately leads to a major data breach.
Chief human hacker Chris Hadnagy, a social engineering expert and author from Social-Engineer.com, sees these scenarios play out every day while working with corporate clients to help them prevent their users from falling victim to these attacks. Hadnagy also hosts the annual Social Engineering Capture the Flag contest at DEF CON, which this year focused on retailers -- particularly employees at some of the nation's biggest big-box stores (including Home Depot) who gave away troves of potentially sensitive information to cold-callers posing sometimes as the IT department.
 
DarkReading/ article/ http://www.darkreading.com/endpoint/how-to-hack-a-human/a/d-id/1316185?

0 replies

Be the first to reply!

Reply