Chapter 4

Hacks Against Individuals

Abstract

Many of the successful cyberattack cases examined by security industry specialists and the media featured social engineering as an integral components of the attack process. In a complex attack that combines technical expertise with social engineering, the latter is especially critical during the reconnaissance phase. In addition to being susceptible to social engineering, individuals often purchase less robust products. Few consumer-grade devices, including home wireless routers, have sufficient security built in. Gartner projects that the number of connected devices will reach 20 billion by 2020. This includes fixed devices (e.g., home appliances) and mobile devices (e.g., fitness trackers and baby ...

Get Hacking Wireless Access Points now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.