Episode 438 – How Social Engineering Works From A Coffee Shop, Do Not Use Your Real Name

This episode is a hypothetical explanation on how the beginning stage of social engineering works. This is to highlight how easy it is to start gathering informaiton about anyone from a simple name and phone number overheard at a coffee shop. 

Source.

Be aware, be safe.

*** Support the podcast with a cup of coffee *** – Ko-Fi Security In Five

Don’t forget to subscribe to the Security In Five Newsletter.

—————— Where you can find Binary Blogger ——————

Security In Five Reddit Channel r/SecurityInFive

Binary Blogger Website

Security In Five Podcast PagePodcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email – bblogger@protonmail.com

Check out this episode!


Become a Patron!

Sign-Up: Free Security Training