Social Engineering

Blog Archive Category

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines

The Exploit articles categorized as Social Engineering

  • Physical Security Pitfalls

    Physical Security Pitfalls: What our physical assessments show us

    By Brian Tant Effective infosec programs are built upon strong physical security. Once an attacker gains physical access, chances of a data breach become much higher. April 19, 2017
  • Low Battery

    Public USB Charging Ports & Their Potential Security Risks

    By Brad Herring Raxis VP of Business Development Brad Herring discusses the risks associated with using public USB charging ports. January 19, 2017
  • Aerial Drones - A New Frontier for Hackers?

    Aerial Drones – A New Frontier for Hackers

    By Brad Herring Raxis VP of Business Development discusses how aerial drones, which are now prevalent, can be used in attacks on your security and what you can do to protect your company. January 2, 2017
  • Person looking at 0s and 1s

    The Human Element is Often the Weakest Link

    By Brad Herring Raxis VP of Business Development Brad Herring discusses social engineering and how many hackers take the easy path & trick employees into giving them access. August 31, 2016