“Humans are a really powerful link in the chain”
DE:CODED is the official podcast from SE Labs.Listen on Apple Podcasts Listen on Spotify Listen on Google Podcasts Listen on Stitcher
Show notes for series 1, episode 1 (How Attackers Attack)
How do attackers attack? Simon and Marc look at their tactics and explore options to help recognise and evade them. They examine social engineering in a cyber security and physical context. And the guys also explore technical exploits. At the end of this episode you will have a great overview of how attackers attack.
Email attachments are not the main way bad guys try to hack you, your computer and your organisation. Successful attackers will also use social engineering attempts to persuade you to open them.
Cold-calling or emailing from out of the blue isn’t going to build the trust required. So they try other things…
How Attackers Attack
We look at how criminals try to exploit our human and technical vulnerabilities.
These vulnerabilities include:
- Human kindness,
- Human fear and
- Vulnerable software
Those are the main areas on which attackers focus. We also cover file-less attacks (which aren’t really file-less); exploit toolkits; and malicious documents.
Watch out for links in email and social media. It’s almost not a case of when shouldn’t you click on them. It’s when should you?
Finally, we suggest a DIY ‘hack’ for viewing suspicious documents. It will improve your security instantly and for free.
There’s a lot more content in the podcast so listen now!
Please subscribe and join the discussions.
Sign up to our newsletter!
- Social engineering introduction (cyber and physical)
- Human and technical vulnerabilities
- De:Coded Cyber website
- SE Labs Email Security test results from 2020
- Have I Been Pwned – Data breach database (look up your own email address)
- Firefox Monitor – Data breach database (look up your own email address)
- WikiLeaks – Leaked information publication
Peek further behind the curtain with DE:CODED Circle.
If you would like access to exclusive, private content from the security testers at SE Labs, please consider applying to join DE:CODED Circle.
DE:CODED Circle is a moderated, vetted community built with the goal of sharing threat intelligence and business-focussed security knowledge to responsible peers.
Please send your comments, questions and concerns to firstname.lastname@example.org.