O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Social engineering

For many attacks to exist, the victim is required to disclose personal information in some way; this is known as social engineering. Hackers are everywhere and they never sleep, whether it might be an SMS text message with an evil intention or a phishing e-mail that is watching every step of yours on your mobile devices.

Whether you're an IT manager protecting employees and corporate systems or you're simply trying to keep your own personal data safe, these threats—some rapidly growing, others still emerging—pose a potential risk.

A good source for a definition of social engineering is http://en.wikipedia.org/wiki/Social_engineering_(security).

Social engineering is committing an act of manipulating people into executing actions ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required