Unit 7: Detection and Prevention 7.2 Additional Resources Additional Resources

mac2022-06-30  27

RESOURCES: SOCIAL ENGINEERING

These stories show some examples of how individuals can be manipulated to reveal personal and organizational information.

这些故事展示了一些个人如何被操纵来揭示个人和组织信息的例子。

Articles

Understanding Social Engineering Attacks, Wordfence

Top 5 Social Engineering Exploit Techniques, Jamey Heary, PCWorld

Phone scammers call the wrong guy, get mad and trash PC, Jérôme Segura, Malwarebytes

Videos

Amazing mind reader reveals his 'gift', Duval Guillaume, YouTube

Anti Social Engineering Training Video, sempra24

DefCon 15 - T112 - No-Tech Hacking, basic204, YouTube

Walmart Prank, anthony11999944, YouTube

Tiger Team - The Car Dealer Takedown, YouTube, norsec0de

Man Steals People's Banking Information, walkinc1, YouTube (NOTE: YouTube captions include some errors, but the action is clear.)

VERIZON DATA BREACH INVESTIGATIONS REPORT

The Verizon 2017 Data Breach Investigations Report (released April 27, 2017)

 

转载于:https://www.cnblogs.com/sec875/articles/10420230.html

相关资源:JAVA上百实例源码以及开源项目
最新回复(0)