Dangerously close to an infinite loop
Which of these is commonly associated with the memory modules in today’s modern PCs?
Which of these is commonly associated with the memory modules in today’s modern PCs?
Is social engineering really a threat? In this video, you’ll learn how a talented social engineer was able to steal a valuable Twitter handle.
The Effectiveness of Social Engineering – CompTIA Security+ SY0-401: 3.3 Read More »
These days, the bad guys know that the management of the company is the one with the money and the power. In this video, you’ll learn about techniques that the bad guys use for hunting the big whale.
We spend a lot of time and resources dealing with electronic hoaxes. In this video, you’ll learn about hoaxes and some resources that you can use to research suspicious email hoaxes.
Impersonation is the foundation of social engineering. In this video, you’ll learn how the bad guys use impersonation to circumvent your security technologies.
Once you’re inside of a building, the security posture of an organization is dramatically decreased. In this video, you’ll learn how the bad guys can get into your secure building without being noticed.
One man’s trash is another man’s security exploit. In this video, you’ll learn about the dangers involved when disposing of your organization’s rubbish.
Dumpster Diving – CompTIA Security+ SY0-401: 3.3 Read More »
What could be easier to social engineer than a shoulder surf? In this video, you’ll learn about shoulder surfing and some methods to protect yourself against this tactic.
Shoulder Surfing – CompTIA Security+ SY0-401: 3.3 Read More »
Which of these applications would be the best choice to provide device COM+ management, access to the Event Viewer, and management of Windows Services?
The most successful attacks happen when the target is least expecting them. In this video, you’ll learn how watering hole attacks can be a very effective way to gain access to an unsuspecting target.
Watering Hole Attack – CompTIA Security+ SY0-401: 3.2 Read More »