COLUMNS
The Weakest Link in the Cybersecurity Chain Is Sitting at the Keyboard

Oct 19, 2017 | 21:08 GMT

Social engineering attacks rely on a combination of charm, psychology and sociology to get the required information from people, rather than on technical hacking of networks.
(ERIC PIERMONT/AFP/Getty Images)
Subscribe Now
SubscribeAlready have an account?