<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Social Engineering on System Overlord</title><link>https://systemoverlord.com/tags/social-engineering.html</link><description>Recent content in Social Engineering on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Sat, 15 Feb 2014 18:20:25 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/social-engineering/index.xml" rel="self" type="application/rss+xml"/><item><title>Weekly Reading List for 2/15/14</title><link>https://systemoverlord.com/2014/02/15/weekly-reading-list-for-21514/</link><pubDate>Sat, 15 Feb 2014 18:20:25 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/02/15/weekly-reading-list-for-21514/</guid><description>&lt;p&gt;I&amp;rsquo;ve been thinking a lot about social engineering lately, so I&amp;rsquo;m going to highlight some of my favorite social engineering resources.&lt;/p&gt;
&lt;h4 id="social-engineering-the-art-of-human-hacking"&gt;Social Engineering: The Art of Human Hacking&lt;/h4&gt;
&lt;p&gt;Chris Hadnagy&amp;rsquo;s book, &lt;a href="http://www.amazon.com/gp/product/0470639539/ref=as_li_ss_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=0470639539&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;Social Engineering: The Art of Human Hacking&lt;/a&gt; is the authoritative guide on social engineering techniques and counter-measures. Chris describes many of the techniques and approaches used by social engineers, ranging from basic pretexting to full-on neuro-linguistic programming. You can&amp;rsquo;t protect against what you can&amp;rsquo;t recognize, so being able to identify the techniques of social engineering is the first step to protecting yourself and your organization.&lt;/p&gt;</description></item><item><title>Social Engineering: The Art of Human Hacking</title><link>https://systemoverlord.com/2012/12/02/social-engineering-the-art-of-human-hacking/</link><pubDate>Sun, 02 Dec 2012 21:49:25 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2012/12/02/social-engineering-the-art-of-human-hacking/</guid><description>&lt;p&gt;I just got done reading Christopher Hadnagy's &lt;a href="http://www.amazon.com/gp/product/0470639539/ref=as_li_ss_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=0470639539&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;Social Engineering: The Art of Human Hacking&lt;/a&gt;. If you are interested in the social aspects of information security, this provides an in-depth view of the actual techniques and science behind social engineering. While books like Kevin Mitnick's &lt;a href="http://www.amazon.com/gp/product/076454280X/ref=as_li_ss_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=076454280X&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;The Art of Deception&lt;/a&gt; and &lt;a href="http://www.amazon.com/gp/product/0471782661/ref=as_li_ss_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=0471782661&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;The Art of Intrusion&lt;/a&gt; tell amusing and noteworthy stories of social engineering hacking, Hadnagy's book tells you &lt;b&gt;why&lt;/b&gt; and &lt;b&gt;how&lt;/b&gt; it works. Hadnagy's exposure all reveals the most important lesson -- how to defend against the attacks.&lt;/p&gt;</description></item></channel></rss>