Anyone who grew up in the days of landline phones and star 67 knows that manipulating people over the phone is a time tested source of entertainment for bored kids. However, sometimes those kids grow up and continue to deceive people over the phone, using their skills to scam organizations and individuals.
Social engineering is essentially the hacking of a human. These exploits have a long history that predates the rise of the internet and even computers. They remain relevant in today’s tech-driven world because it is much easier to hack a human than it is to hack into software or hardware.
This post dives into what social engineering is, the different types of social engineering, some ways to recognize a social engineering attack, and tips to avoid falling victim to social engineering scams.
I have always been interested in the offensive security field and its benefits to businesses and people. I believe that sometimes, people don’t understand a threat unless it has directly affected them or someone they know. I was recently promoted to the position of Cyber Security Specialist at Twinstate Technologies®, but more notably, am known as the Social Engineering Technician and Wireless Penetration Tester. As a key member of the Red Team here at Twinstate, I couldn’t have been more excited to travel to Las Vegas and attend my very first Def Con.
Clicking “Like” on a Tweet, tagging yourself in a photo on Facebook; today, almost everyone has at least one form of social media account where information is shared openly within their immediate friend circle. But in reality, your information is shared far beyond your network and can easily be captured by social engineering criminals who are looking to exploit your privacy and security.