Podcast FAQ

the social engineer podcast

by Scot Ortiz Jr. Published 2 years ago Updated 1 year ago
image

What is the social-engineer podcast?

The Social-Engineer Podcast is a monthly discussion hosted by a panel of security experts that make up the SEORG Crew. We include guests from diverse backgrounds to discuss human behavior and its implications for information security. Human Hacking Conference 2021 Goes Virtual!

What is the social-engineer framework?

The Social-Engineer Framework is a searchable information resource for people wishing to learn more about the psychological, physical and historical aspects of social engineering.

How do you define social engineering?

We define it in very broad and general terms because we feel that social engineering is not always negative. It can also encompass how we communicate with our parents, therapists, children, spouses, and others. Educational content about everything from social engineering to psychology.

What are some good resources for learning about social engineering?

Educational content about everything from social engineering to psychology. Monthly article that delves deep into social engineering topics. The Social-Engineer Framework is a searchable information resource for people wishing to learn more about the psychological, physical and historical aspects of social engineering.

image

What are examples of social engineering?

The following are the five most common forms of digital social engineering assaults.Baiting. As its name implies, baiting attacks use a false promise to pique a victim's greed or curiosity. ... Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. ... Pretexting. ... Phishing. ... Spear phishing.

What is meaning of social engineer?

Social engineering is the act of exploiting human weaknesses to gain access to personal information and protected systems. Social engineering relies on manipulating individuals rather than hacking computer systems to penetrate a target's account.

Is social engineer a job?

In the end of the day, social engineering is an exciting and very rewarding career path. Study hard, stay out of trouble and get practical experience where you can and it may just be your career someday too.

What psychological factors does social engineering implement?

They do this through trial and error. The social engineer needs confidence in each psychological influence characteristic they choose....Consistency.Authority.Obligation.Social Proof.Liking.Commitment.Concession.Scarcity.

What is the goal of social engineering?

Definition. Social engineering is a psychological attack against a company or an organization that aims to exploit people's natural tendency to trust others.

How do DDoS attacks work?

In a DDoS attack, cybercriminals take advantage of normal behavior that occurs between network devices and servers, often targeting the networking devices that establish a connection to the internet. Therefore, attackers focus on the edge network devices (e.g., routers, switches), rather than individual servers.

What companies employ white hat hackers?

Big brand names like IBM, Visa, Sky, KPMG, Vodaphone, Asda and McAfee all employ people as penetration testers to perform authorised tests on their systems to expose weaknesses.

Can you study social engineering?

Social engineering is used by political, corporate and military strategist to foster their agendas, gain social control, manage social change and regulate the future development and behavior of a society.

What makes a good social engineer?

The social engineer will have good modulation, tenor, and vibrato to their voice. These characteristics give the voice a very soothing and calming effect. Ultimately, the voice helps the social engineer reinforce that he or she is a safe and good person to converse with.

What is the most powerful tool in combating social engineering?

Being aware and taking steps to increase awareness is the best and the most powerful tool in the battle against cyber-crimes such as social engineering.

What three best practices can help defend against social engineering attacks?

Best Practices to Prevent Social Engineering AttacksSet spam filters to high. Every email program has spam filters. ... Never use the same password for different accounts. ... Use two-factor or multi-factor authentication. ... When in doubt, change passwords right away. ... Educate employees.

What is a common method used in social engineering?

PhishingPhishing. The most common form of social engineering attack is phishing. Phishing attacks exploit human error to harvest credentials or spread malware, usually via infected email attachments or links to malicious websites.

What is another name for social engineering?

In this page you can discover 6 synonyms, antonyms, idiomatic expressions, and related words for social engineering, like: crackers, sociology, human factor and social engineering, social-work, mitnick, kevin (a.k.a. condor) and social planning.

What is social engineering and how does it work?

Social engineering is a technique used by criminals and cyber-crooks to trick users into revealing confidential information. The data obtained is then used to gain access to systems and carry out actions to the detriment of the person or organization whose data has been revealed.

How is social engineering done?

Social engineering is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system. The hacker might use the phone, email, snail mail or direct contact to gain illegal access. Phishing, spear phishing, and CEO Fraud are all examples.

What is social engineering in sociology?

Social engineering is a top-down effort to influence particular attitudes and social behaviors on a large scale—most often undertaken by governments, but also carried out by media, academia or private groups—in order to produce desired characteristics in a target population.

How many books has Joe authored?

After serving as an FBI agent for 25 years, Joe has become a nonverbal and behavioral expert. Since retiring, he has authored 14 books in 29 languages dealing with human behavior and body language. His book “What Every BODY Is Saying” remains the #1 selling body-language book in the world for over 12 years.

Who wrote the Talent Code?

The Talent Code: Greatness Isn't Born. It's Grown. Here's How. by Daniel Coyle

Who is Chase Hughes?

Chase Hughes is an ex-military Chief that wanted to learn how to better the study of influence. He wanted to see if he could teach anyone to use these skills fast and with precision. Join us this month as we discuss this very topic with Chase and try to answer:

Ep. 164 - Security Awareness Series - Metrics and Empathy the Answer To Cyber Breaches with Kate Mullin

This month Chris Hadnagy and Ryan MacDougall are joined by Kathleen (Kate) Mullin. Kate is an influential information security practitioner with over 30 years of experience. Kate currently is CISO with Cancer Treatment Centers of America.

Ep. 162 - Security Awareness Series - What Cows Can Teach You About Infosec with John Strand

This month Chris Hadnagy and Ryan MacDougall are joined by John Strand from Black Hills Information Security. John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing.  He is a coveted speaker and much-loved SANS teacher.

Ep. Special Edition 001 - Human Element Series - Covid-19 Test Site Scams

This is a special edition of Social-Engineer's Human Element Series Podcast. Chris Hadnagy will discuss Covid-19 testing site scams, and how you can protect yourself against them. [January 14, 2022]

Social-Engineer Blog

Educational content about everything from social engineering to psychology.

The Social-Engineer Framework

The Social-Engineer Framework is a searchable information resource for people wishing to learn more about the psychological, physical and historical aspects of social engineering.

1. The Social-Engineer Podcast

Orlando, Florida, US The Social-Engineer Podcast is about humans.

2. Hacking Humans

Fulton, Maryland, US Join Dave Bittner and Joe Carrigan each week as they look behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a heavy toll on organizations around the world. Also in The CyberWire Podcasts thecyberwire.com/podcasts/ha.. 18.9K ⋅ 35.4K ⋅ 2 episodes / week ⋅ Avg Length 26 min ⋅ May 2018 View Latest Episodes ⋅ Get Email Contact.

3. Protecting People

New York City, New York, US Today's cyberattacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. In each episode, you'll learn how today's threats really work, who's being targeted by them, and what you can do to safeguard your people, data, and systems.

4. Human Factor Security

Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life. humanfactorsecurity.co.uk/ca.. 19.2K ⋅ 4 episodes / month ⋅ Avg Length 40 min ⋅ Jun 2018 View Latest Episodes ⋅ Get Email Contact

Feedspot Media Contact Database

Get access to 250k active Bloggers, Podcasters, Youtubers, and Instagram Influencers in 1500 niche categories.

image
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9