The psychology of social engineering—the “soft” side of cybercrime

CERT-LatestNews SocialEngineering ThreatsActivists ThreatsCybercrime ThreatsEconomic ThreatsStrategic Uncategorized

Forty-eight percent of people will exchange their password for a piece of chocolate,[1] 91 percent of cyberattacks begin with a simple phish,[2] and two out of three people have experienced a tech support scam in the past 12 months.[3] What do all of these have in common? They make use of social….