Mauro Verderosa

Getting under the skin: The Social Engineering techniques

What is the one security vulnerability that can't be patched? The human. Learn the psychological tricks attackers use to bypass your best defenses.

Getting under the skin: The Social Engineering techniques
#1about 7 minutes

The 1978 heist that pioneered social engineering

Stanley Mark Rifkin exploited procedural manuals and used pretexting to steal millions from a bank without any technical hacking.

#2about 3 minutes

Understanding the five main motivations for cybercrime

Cyber attacks are driven by distinct goals, including financial gain, business competition, political influence, ideology, or simple curiosity.

#3about 5 minutes

What social engineering is and its real-world impact

Social engineering is the psychological manipulation of people to divulge information, as seen in major breaches at companies like RSA and Sony.

#4about 7 minutes

An overview of common social engineering attack techniques

Attackers use various methods like pretexting, phishing, baiting, and tailgating to trick victims into compromising security.

#5about 2 minutes

Psychological triggers that make social engineering effective

Attacks succeed by exploiting human emotions and cognitive biases such as authority, guilt, panic, desire, and greed.

#6about 4 minutes

Deconstructing real-world phishing and vishing attacks

A simple phishing email is analyzed for pressure tactics, followed by a vishing example where an attacker impersonates a spouse to gain account access.

#7about 5 minutes

Understanding the complete social engineering attack lifecycle

A successful attack follows distinct phases, from initial reconnaissance and scanning to lateral movement, data exfiltration, and finally covering tracks.

#8about 6 minutes

A step-by-step case study from Mr. Robot

An elaborate attack demonstrates how gathering small, public details from social media and real-world observation leads to a full account compromise.

#9about 5 minutes

Key takeaways and defenses against social engineering

The most effective defense against social engineering is continuous employee training and fostering a security-aware culture to patch the human vulnerability.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

Related Articles

View all articles
CH
Chris Heilmann
Dev Digest 138 - Are you secure about this?
Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Dev Digest 138 - Are you secure about this?
DC
Daniel Cranney
Understanding and Mitigating Common Web Vulnerabilities
Vulnerabilities exist in many forms on the web, and attackers continue to find creative ways to exploit them. Technological advances like the proliferation of AI are of course exciting nd filled with opportunities, they equally present opportunities ...
Understanding and Mitigating Common Web Vulnerabilities

From learning to earning

Jobs that call for the skills explored in this talk.

Security Engineer

Security Engineer

Cyberr®
Municipality of Madrid, Spain

Remote
Bash
Azure
Python
Powershell
+4
Cybersecurity Engineer

Cybersecurity Engineer

Darkshield Technologies Ltd.
York, United Kingdom

Remote
Bash
Azure
Python
Powershell
+4