From the course: Writing Secure Code for Android by Infosec
Unlock this course with a free trial
Join today to access over 25,400 courses taught by industry experts.
Social engineering
From the course: Writing Secure Code for Android by Infosec
Social engineering
- Let's spend a moment to talk about social engineering. You know, there's an old saying you can't fix stupid, right? But it would be too simplistic to say that people who fall for social engineering are stupid, even highly educated, highly aware, highly security conscious IT professionals can be caught off guard now and again. Social engineering is a type of attack that does not exploit technology, although that might be sort of a side thing. It exploits human psychology because humans tend to be the weak link here. The goal is to trick a user into doing something or divulging something they ordinarily wouldn't do, that they shouldn't do. Here are some common types of social engineering attacks. You've probably heard of many of them. Perhaps the most common is phishing, spelled with ph. This is where we send a deceptive email to a wide range of people. Even if the email addresses aren't valid, we're trying to trick them into clicking something, opening an attachment, something to…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
(Locked)
System integrity8m 26s
-
(Locked)
Application integrity11m 28s
-
(Locked)
Understanding risks of embedding third-party code8m 16s
-
(Locked)
Activity: Working with external code6m 58s
-
(Locked)
Exception handling, part 16m 52s
-
(Locked)
Exception handling, part 27m 8s
-
(Locked)
Printing and logging, part 18m 53s
-
(Locked)
Printing and logging, part 29m 39s
-
(Locked)
Activity: Handling exceptions, logging and printing, part 113m 2s
-
(Locked)
Activity: Handling exceptions, logging and printing, part 211m 46s
-
(Locked)
Testing types, part 113m 57s
-
(Locked)
Testing types, part 23m 9s
-
(Locked)
Tamper protection10m 2s
-
(Locked)
Activity: Reverse engineering an Android app8m 32s
-
(Locked)
Root detection8m 45s
-
(Locked)
Social engineering6m 39s
-
(Locked)
New vulnerability research2m 36s
-
(Locked)
Secure Android coding roundup5m 19s
-
(Locked)
-