Feb 27, 2019
This episode is a hypothetical explanation on how the beginning stage of social engineering works. This is to highlight how easy it is to start gathering informaiton about anyone from a simple name and phone number overheard at a coffee shop.
Be aware, be safe.
*** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five
Don't forget to subscribe to the Security In Five Newsletter.
—————— Where you can find Binary Blogger ——————
Email - firstname.lastname@example.org