article thumbnail

Social Engineering At Work: Some books that have helped me

Architect Security

One of my talks is about using “Social Engineering at work” – how to gain and utilize positive influence to get things done. I took a photo of the human-relevant section of my book collection (the part that is not in storage) to share some of the books that have helped me (see below): From […]

article thumbnail

3 Top Things to Know About Social Engineering

SecureWorld News

On a recent SecureWorld Sessions podcast episode, Social Engineering: Hacking Humans , host Bruce Sussman spoke with Christopher Hadnagy, an entrepreneur and author of five books about social engineering and hacking the human. 1 How do you define social engineering? 19 million, okay?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Social engineering, deception becomes increasingly sophisticated

Security Affairs

Social engineering techniques are becoming increasingly sophisticated and are exploiting multiple emerging means, such as deep fakes. He is also the author of the book “La Gestione della Cyber Security nella Pubblica Amministrazione”. Deepfake technology, what’s it? Education improves awareness” is his slogan.

article thumbnail

FBI arrests social engineer who allegedly stole unpublished manuscripts from authors

CSO Magazine

With the arrest of Bernardini, the DoJ unsealed a grand jury indictment dated July 14, 2021, of Bernardini that revealed a “multi-year scheme to impersonate individuals involved in the publishing industry in order to fraudulently obtain hundreds of prepublication manuscripts of novel and other forthcoming books.”

article thumbnail

Amygdala Hijacking and Social Engineering

Security Through Education

What is Amygdala Hijacking Psychologist and author Daniel Goleman coined the term “Amygdala Hijack” in his 1995 book “Emotional Intelligence.” Social engineering is defined as influencing someone to take an action that may or may not be in a person’s best interest. The amygdala “hijacks” the frontal lobe.

article thumbnail

Humble Bundle: Good, Cheap Books

Adam Shostack

There’s a humble bundle out that includes my Threat Modeling: Designing for Security, The Shellcoders Handbook, Practical Reverse Engineering, The Art of Intrusion, Social Engineering, Crypto Engineering, a nearly complete set of Bruce Schneier, and more! And your donations benefit EFF!

article thumbnail

‘Fix It’ social-engineering scheme impersonates several brands

Malwarebytes

Social engineering is a core part of these schemes and the tricks we see are sometimes very clever. Oddly, we saw a lure for a cruise booking site. Overlap with other campaigns As mentioned previously, this type of social engineering attack is getting more and more popular.