Social engineering

Social engineering: 3 examples of human hacking


Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more.

Social engineering expert Chris Hadnagy shares juicy tales of successful cons he's seen as a security consultant, and six prevention tips

Chris Hadnagy gets paid to fool people, and he's gotten pretty good at it over the years. A co-founder of and author of Social Engineering: The Art of Human Hacking, Hadnagy has been using manipulation tactics for more than a decade to show clients how criminals get inside information.

Hadnagy outlines three memorable stories of social engineering tests that he's included in his new book (you can also read a short excerpt), and points out what organizations can learn from these results.

The Overconfident CEO

In one case study, Hadnagy outlines how he was hired as an SE auditor to gain access to the servers of a printing company which had some proprietary processes and vendors that competitors were after. In a phone meeting with Hadnagy's business partner, the CEO informed him that "hacking him would be next to impossible" because he "guarded his secrets with his life."

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address:
Insider: 10 Tough Security Interview Questions, and How to Answer Them
View Comments
You Might Like
Join the discussion
Be the first to comment on this article. Our Commenting Policies