One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 436928
Date de publication 2017-11-21 20:39:43 (vue: 2017-11-21 20:39:43)
Titre NBlog November 21 - A to Z of social engineering techniques
Texte On a roll from yesterday's A-to-Z catalog of scams, con-tricks and frauds, I'm writing another A-Z today, this time focusing on social engineering techniques and methods.  Yesterday's piece was about what they do.  Today's is about how they do it.Given my background and the research we've done, it's surprisingly easy to find appropriate entries for most letters of the alphabet, albeit with a bit of creativity and lateral thinking needed for some (e.g. "Xtreme social engineering"!).  That's part of the challenge of writing any A to Z listing ... and part of the allure for the reader. What will the Z entry be?  As of this moment, I don't actually know but I will come up with zomething!Both awareness pieces impress upon the reader the sheer variety of social engineering, while at the same time the alphabetical sequence provides a logical order to what would otherwise be a confusing jumble of stuff. Making people aware of the breadth and diversity of social engineering is one of the key learning objectives for December's NoticeBored module. Providing structured, useful, innovative awareness content is what we do.We hope to leave a lasting impression that almost any social interaction or communication could be social engineering - any email or text message, any phone call or conversation, any glance or frown, any blog item (am I manipulating your thoughts? Am I persuading you to subscribe to NoticeBored? Look deeply into my eyes. Concentrate on the eyes. You are starting to feel drowsy ...)Yes, hypnosis will make an appearance in today's A-Z.  It's not entirely serious!Tomorrow, after completing the second, I'd like to complete the set with a third piece concerning the controls against social engineering. Can we come up
Envoyé Oui
Condensat   yesterday  what about actually after against albeit allure almost alphabet alphabetical another any appearance appropriate are aware awareness back background bit blog both breadth but call can catalog challenge come communication could complete completing con concentrate concerning confusing content controls conversation creativity december deeply diversity don done drowsy easy email engineering entirely entries entry eyes feel find focusing frauds from frown given glance hope how hypnosis impress impression innovative interaction item jumble key know lasting lateral learning leave letters like list listing logical look make making manipulating message methods module moment most nblog needed not noticebored november objectives one order otherwise out part people persuading phone piece pieces provides providing reader reasonable research roll same scams second sequence serious set sheer social some starting structured stuff subscribe surprisingly techniques text that thinking third thoughts time today tomorrow tricks turns upon useful variety what will would writing xtreme yesterday your zomething
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: