Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying The Art of Social Engineering
  • Table Of Contents Toc
  • Feedback & Rating feedback
The Art of Social Engineering

The Art of Social Engineering

By : Cesar Bravo, Desilda Toska
4.9 (9)
close
close
The Art of Social Engineering

The Art of Social Engineering

4.9 (9)
By: Cesar Bravo, Desilda Toska

Overview of this book

Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them. The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks. You’ll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques. By the end of this social engineering book, you’ll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.
Table of Contents (17 chapters)
close
close
1
Part 1: Understanding Social Engineering
6
Part 2: Enhanced Social Engineering Attacks
11
Part 3: Protecting against Social Engineering Attacks

Social engineering through mobile applications

The rise of smartphones and app-based technologies has led to significant transformations in social engineering through mobile applications. In the pre-smartphone era, limited functionality and connectivity minimized social engineering attacks. However, the introduction of app stores provided a platform for malicious actors to exploit the popularity of apps, tricking users into downloading fake or malicious applications.

An important development in this evolution was the emergence of app permissions and data access. Users often granted excessive permissions without fully understanding the associated risks, granting attackers access to personal information.

As smartphone apps grew, cybercriminals became more sophisticated, distributing malware-infected apps and employing phishing tactics. Social networking platforms and dating apps also became targets for manipulation through fake profiles, romance scams, and clickbait attacks.

...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY