- the motivations and objectives behind attempted breaches by foreign intelligence services, criminal groups, industrial competitors, activists and other threat actors
- how social media and carefully crafted insights into a victim's motivations and vulnerabilities are leveraged during phishing, smishing, vishing and other advanced social engineering operations to obtain even closely held information
- the psychology behind why humans are so susceptible to social engineering, and how influence techniques are used to circumvent established security protocols
- how spies and other social engineers use elicitation to legally procure protected information from victims who often have no idea they're being used
Book
Confessions of a CIA Spy: The Art of Human Hacking
by Peter Warmka
(Write a Review)
Paperback
$19.99
- the motivations and objectives behind attempted breaches by foreign intelligence services, criminal groups, industrial competitors, activists and other threat actors
- how social media and carefully crafted insights into a victim's motivations and vulnerabilities are leveraged during phishing, smishing, vishing and other advanced social engineering operations to obtain even closely held information
- the psychology behind why humans are so susceptible to social engineering, and how influence techniques are used to circumvent established security protocols
- how spies and other social engineers use elicitation to legally procure protected information from victims who often have no idea they're being used
Paperback
$19.99