-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

The Art of Social Engineering
By :

As you already saw, you can implement several techniques to reduce the risk in each of the stages of the social engineering life cycle.
However, let's summarize those methods, techniques, and controls that you can implement through the different stages of the social engineering life cycle.
One of the most common sources for attackers to start harvesting data is social media platforms, so remember that “Think before you post” is one of the best pieces of advice to avoid sharing data that an attacker may use against you.
Limit access to only people you know to prevent strangers from accessing your pictures, posts, and so on.
Also, the more granularly you configure privacy settings, the more control you will have over your data.
Attackers may clone the profile of one of your friends to trick you into accepting their friend...
Change the font size
Change margin width
Change background colour