Social engineering stories from the front lines

It’s always amazing how little attention social engineering attacks get when discussing enterprise information security risks. After all, it’s usually easier to get an unsuspecting employee to click on a link than it is to find an exploitable vulnerability on a reasonably hardened webserver. Social engineering attacks come from many different angles: from targeted e-mails, phone call pretexting, or acting like a service technician or other innocuous person to obtain access to the IT resources and data they seek.

But how do successful social engineering attacks happen in reality, when conducted either by ethical hacker penetration teams or criminal attackers? To get an answer, we reached out to a number of security professionals and ethical hackers who face, or perform, social engineering attacks as part of their job.

To read this article in full or to leave a comment, please click here

Read more: Social engineering stories from the front lines

Story added 29. January 2015, content source with full text you can find at link above.