• book

From the Publisher

With an increase in security breaches which result in compromised customer records, companies of all sizes need to understand the deceptive practices that social engineers use and how to protect themselves and their customers from attacks.
Learn what social engineering is, how it is used to gain access to corporate information and customer data.

Published: Voxeo Corportation on
ISBN: 9781476087160
Read on Scribd mobile: iPhone, iPad and Android.
Availability for Hampering the Human Hacker and the Threat of Social Engin...
With a 30 day free trial you can read online for free

    Related Articles

    Bloomberg Businessweek
    4 min read

    Where Buying Data Is as Easy as Buying Cabbage

    Christina Larson, with Bloomberg News The typical image of Chinese hackers is of operatives working for or with the tacit approval of the government, targeting valuable or sensitive data at foreign companies or government agencies. While there are plenty of those, many in China—like hackers elsewhere—also target the laptop of their ex-boss or the smartphone of the guy in front of them at the coffee shop. China’s criminal hacking community numbers at least 400,000 and sucks 100 billion yuan ($15 billion) out of the country’s economy each year, according to Zheng Bu, an angel investor and form
    Fast Company
    4 min read

    Cyber Immunity

    The program coordinator at the Catholic Charities of Santa Clara County in California never suspected that an email she received earlier this year contained anything more than the corporate invoice it claimed. But as soon as she opened the attachment, malware began to encrypt data on her computer. The breach threatened to expose far more than just her personal files: In order to provide its customers with health care, immigration assistance, and other social services, Catholic Charities handles the medical and financial records of more than 54,000 people each year. Of all the cybersecurity sys
    2 min read

    For Cybersecurity Companies, It's Time to Shine

    This article is part of our Trends 2016 coverage. RAM scraping, phishing, keylogging -- you may not be familiar with all the schemes hackers use to invade personal data and business systems, but chances are you have been affected in some way by cybercrime -- or soon will be. Security firm Gemalto estimates that data breaches increased 49 percent in 2014, and its stats for the first half of 2015 reveal a 10 percent uptick. Following high-profile meltdowns at Sony, Target, eBay, Ashley Madison, Anthem and even the U.S. government, businesses large and small are having a come-to-Jesus moment abou