Kevin Mitnick knows that the weakest link in any security system is the person holding the information. As a young fugitive hacker,he went to jail for breaking into computer networks, mostly by using his cunning and persuasion than his tech skills. He was an early master of the science of social engineering -- making people into doing what you want
read more
Thursday, August 7, 2008
Social Engineering 101: Hackers Show How It's Done
at
12:12 AM
·
Subscribe to:
Post Comments (Atom)
Subscribe free via email
My Favourite Blog List
Blog to watch
Labels
- Access Control (1)
- Anti-Virus (2)
- Article from Others (47)
- backup and Recovery (1)
- CAAT (1)
- Cryptography (1)
- Cyber Security (11)
- Data Protection (6)
- Data Security (10)
- Decision Support System (1)
- DMZ (1)
- Error detection (2)
- Firewall (2)
- Firewall audit (2)
- Google (1)
- Hacking (4)
- Identity Stealing (3)
- IDS (1)
- Information Security (51)
- internet (5)
- IS Audit (5)
- IT Risk (3)
- Kerberos (1)
- Media disposal (1)
- Network Security (2)
- Networking (1)
- OpenID (1)
- Outsourcing (1)
- password (1)
- Penetration Testing (3)
- PKI (1)
- Privacy (1)
- Programming (1)
- SAS 70 (1)
- Single Sign-on (1)
- Social Engineering (1)
- SSO (1)
- sysAdmin (1)
- System Administration (1)
- Vulnerability Assessment (1)
- Web security (4)
- Wireless network (2)
- WLAN (1)
0 comments:
Post a Comment