Social Engineering is an accepted APT and is going to stay. Most of the high-value hacking attacks feature components of social engineering. Understanding of the methods and approaches used behind the scene of Social Engineering will help you to make the world a safer place. Or make your attack plans more successful. This article is based on a book I recently wrote about Social Engineering. As a bonus I will present the readers with a free download code for ebook-versions (PDF, epub, mobi) of my book for further study This article appears in the special edition „In Depth Security – Proceedings of the DeepSec Conferences Vol. 2“. Edited by Stefan Schumacher and René Pfeiffer
%0 Book Section
%1 mjs:Brack:SEET
%A Brack, Dominique C.
%D 2017
%K ds17 editor
%N 2
%P 830-857
%T Social Engineering - The Most Underestimated APT
%U http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_056_Brack_SEET.pdf
%V 14
%X Social Engineering is an accepted APT and is going to stay. Most of the high-value hacking attacks feature components of social engineering. Understanding of the methods and approaches used behind the scene of Social Engineering will help you to make the world a safer place. Or make your attack plans more successful. This article is based on a book I recently wrote about Social Engineering. As a bonus I will present the readers with a free download code for ebook-versions (PDF, epub, mobi) of my book for further study This article appears in the special edition „In Depth Security – Proceedings of the DeepSec Conferences Vol. 2“. Edited by Stefan Schumacher and René Pfeiffer
@inbook{mjs:Brack:SEET,
abstract = {Social Engineering is an accepted APT and is going to stay. Most of the high-value hacking attacks feature components of social engineering. Understanding of the methods and approaches used behind the scene of Social Engineering will help you to make the world a safer place. Or make your attack plans more successful. This article is based on a book I recently wrote about Social Engineering. As a bonus I will present the readers with a free download code for ebook-versions (PDF, epub, mobi) of my book for further study This article appears in the special edition „In Depth Security – Proceedings of the DeepSec Conferences Vol. 2“. Edited by Stefan Schumacher and René Pfeiffer},
added-at = {2021-09-19T18:42:17.000+0200},
author = {Brack, Dominique C.},
biburl = {https://www.bibsonomy.org/bibtex/23dfcb2b3f07cf184b319ae9caac2fc2c/steschum},
interhash = {aa16b6939f47b67bc4ff3844daca8c16},
intrahash = {3dfcb2b3f07cf184b319ae9caac2fc2c},
issn = {2192-4260},
journaltitle = {Magdeburger Journal zur Sicherheitsforschung},
keywords = {ds17 editor},
language = {DE},
number = 2,
pages = {830-857},
subtitle = {Hacking the Human Operating System},
timestamp = {2021-10-22T17:15:30.000+0200},
title = {Social Engineering - The Most Underestimated APT},
url = {http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_056_Brack_SEET.pdf},
urldate = {2017-09-18},
volume = 14,
year = 2017
}