Preview Mode Links will not work in preview mode

Security In Five Podcast


Feb 27, 2019

This episode is a hypothetical explanation on how the beginning stage of social engineering works. This is to highlight how easy it is to start gathering informaiton about anyone from a simple name and phone number overheard at a coffee shop. 

Source.

Be aware, be safe.

*** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five

Don't forget to subscribe to the Security In Five Newsletter.

—————— Where you can find Binary Blogger ——————

Security In Five Reddit Channel r/SecurityInFive

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - bblogger@protonmail.com