Human hacking — commonly referred to as ‘social engineering’ — predates computers. How can you avoid being manipulated into disclosing information that should be kept close to the vest?

“Human hacking” predates computers. (Source: Getty Images)

Whenever we hear of a cybersecurity incident, the first thing that many people picture is a dark-hooded hacker sitting behind a computer who has used their super l33t skills to penetrate the network of a company and take all the company’s data.

What occurs more commonly is a breakdown at…

Rey Bango

Tinkering in cybersecurity at Veracode and helping developers build secure software. Fortis Fortuna Adiuvat. Opinions are mine.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store