Getting under the skin: the Social Engineering techniques
*** The Live will start in this page on the 5th of October ***
In a world where the cybersecurity applications are day after day more protected and solid, the most malicious attackers decide to target the weakest ring of system: the human.
Through this presentation we will discover what are the social engineering attacks, how they are defined, how they are performed and how they can be identified before the attacker might be able to gain the access to the most sensitive information.
Leave a comment