Session 2: Inside Social Engineering Attacks

Presented by: Mel Beckman

Running Time: 61 minutes

This session illustrates in detail the various technical means hackers employ in social engineering attacks. You'll learn about phishing and spear phishing, induced drive-by infections, telephone and voicemail attacks, social networking attacks through Facebook and LinkedIn, and attacks through personal mobile devices.

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.