Getting under the skin: The Social Engineering techniques
What is the one security vulnerability that can't be patched? The human. Learn the psychological tricks attackers use to bypass your best defenses.
#1about 7 minutes
The 1978 heist that pioneered social engineering
Stanley Mark Rifkin exploited procedural manuals and used pretexting to steal millions from a bank without any technical hacking.
#2about 3 minutes
Understanding the five main motivations for cybercrime
Cyber attacks are driven by distinct goals, including financial gain, business competition, political influence, ideology, or simple curiosity.
#3about 5 minutes
What social engineering is and its real-world impact
Social engineering is the psychological manipulation of people to divulge information, as seen in major breaches at companies like RSA and Sony.
#4about 7 minutes
An overview of common social engineering attack techniques
Attackers use various methods like pretexting, phishing, baiting, and tailgating to trick victims into compromising security.
#5about 2 minutes
Psychological triggers that make social engineering effective
Attacks succeed by exploiting human emotions and cognitive biases such as authority, guilt, panic, desire, and greed.
#6about 4 minutes
Deconstructing real-world phishing and vishing attacks
A simple phishing email is analyzed for pressure tactics, followed by a vishing example where an attacker impersonates a spouse to gain account access.
#7about 5 minutes
Understanding the complete social engineering attack lifecycle
A successful attack follows distinct phases, from initial reconnaissance and scanning to lateral movement, data exfiltration, and finally covering tracks.
#8about 6 minutes
A step-by-step case study from Mr. Robot
An elaborate attack demonstrates how gathering small, public details from social media and real-world observation leads to a full account compromise.
#9about 5 minutes
Key takeaways and defenses against social engineering
The most effective defense against social engineering is continuous employee training and fostering a security-aware culture to patch the human vulnerability.
Related jobs
Jobs that call for the skills explored in this talk.
Dev Digest 138 - Are you secure about this?Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Daniel Cranney
Dev Digest 191: Malware interviews, EU ❤️ Open Source and Skilled AgentsInside last week’s Dev Digest 191 .
💻 Want to write for the WeAreDevelopers Magazine?
⚒️ Claude skills - a less token hungry MCP?
🫰 How much does Cursor spend on AWS?
🧠 LLMs and Brain Rot
🟥 Change your NPM tokens now!
🧑 Fake AI recruiters delivering...
Daniel Cranney
Dev Digest 214: Claude Is Leaking, GitHub Is Listening & Axios Hacked!Inside last week’s Dev Digest 214 .
🕵️ Claude source code leaked, analysed and re-written in 2 days
🐙 GitHub auto-opts users into feeding their code to train their AI
🌐 Pretext shows how to show complex text rendering in the browser
🤖 How to securin...