
Social Engineering
Hiding in Plain Sight, InfoSec Series
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
$0.99/mo for the first 3 months

Buy for $6.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Rich Grimshaw
-
By:
-
Patricia Arnold
About this listen
The movie industry has glamorized the abilities of technically talented people. From Mission Impossible to The Matrix, we are impressed at what the human mind can accomplish with the assistance of a computer.
This book doesn't underestimate gifted hacker groups, but it does raise the question of how much ammo we giving them to launch their attack.
The human mind can devise ways to think outside of the constructs of the box even when provided with the smallest details.
Even though computers are an important tool, successful hacking doesn't just begin with advanced technical abilities. Sometimes it requires more rudimentary techniques, such as the investigative abilities that you may find in a 1940's gumshoe. Personality goes a long way.
A successful social engineer requires a little bit of charm, persuasiveness and listening abilities to get the information that they need. If you've lost money recently, chances are, a con man in his pajamas could be the culprit rather than a stereotypical hacker in a carefully concealed computer lab.
There's no reason to hide when the information for a preliminary attack is out there. After all, why hide in a bunker when the target (me and you) tells them everything they need to get started?
Social Engineering begins by exploiting the human factor in such a way that can be obvious but is somehow missed. Hiding in Plain Sight will explain my research about this increasing element that allows groups of individuals to steal and often be provided with privileged, personal information.
Yet somehow, we are not adequately aware. If we were, I wouldn't hear of devastating financial losses from individuals that are not usually easily fooled. Many refer to much of this fraudulent activity as identity theft, but I believe that there is more going on here than what can be seen on the surface.
©2012 Patricia Arnold (P)2014 Patricia ArnoldListeners also enjoyed...
-
AWS Certified Developer Associate
- Step by Step Certification Study Guide, to Pass the Developers Exam with Confidence
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 3 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you aspiring to become an AWS Certified Developer? Are you looking for a comprehensive resource to prepare for the AWS Certified Developer exam? Look no further! This book is your ultimate guide to acing the AWS Certified Developer certification by providing you with a robust set of practice test questions and detailed answers to help you succeed.
-
-
Read by AI
- By Luke on 06-22-24
By: Jamie Murphy
-
Computer Networking Beginners Guide
- Networking for Beginners. A Simple and Easy Guide to Manage a Network Computer System from the Basics
- By: Erick Stack
- Narrated by: Clay Bel le Fort
- Length: 3 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the advent off the wireless technology era, the existing communication technologies were primarily powered by wired technology. From the telephone to the fax machine, communication was not possible without a physical connection between the communication device and the source of the power of the device. For instance, there had to be a connection between a wired telephone and the dial board for communication to be possible. Just as with every other wired device, wireless communication has successfully displaced wired communication.
By: Erick Stack
-
Hacking with Kali Linux
- Step by Step Guide to Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide
- By: Anthony Hack
- Narrated by: Jordan Gunner
- Length: 3 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
Would you like to learn professional hacking techniques and strategies? Do you want to protect your data from hackers? Become a hacker yourself with this audiobook...Hacking is a very complicated series of processes that take a lot of effort and there are many things that you will need to learn. Hopefully, this audiobook will give you the most basic information so that you will be able to do this properly.
By: Anthony Hack
-
AWS: A Comprehensive Guide to Mastering Amazon Web Services
- By: Aaron Hudson
- Narrated by: Mat Clista
- Length: 4 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
You are about to learn the limitless power of Amazon Web Services (AWS) to decide whether it is the perfect cloud computing solution for your business! Efficient, high performing, and profitable companies around the world have realized that cloud computing is the secret to massive growth and efficiency in service delivery on a global scale especially because it (cloud computing) allows data access from anywhere in the world.
-
-
Outdated material
- By Stacey on 04-11-25
By: Aaron Hudson
-
Computer Networking First Step
- The Essential Guide to Networking to Introduce Yourself to The Computer Network Through a Top-Down Approach and Various Infrastructures (Programming)
- By: Tim Wired
- Narrated by: Jacob McNatt
- Length: 3 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
While you may have never thought of networking in detail, this book will introduce you to the basics of networking, the different types of networks available, the types of network topologies that you will encounter, the concept of server virtualization, and details of how to handle network breaches.
-
-
If you don't have a text copy of the book, beware
- By A Consumer on 04-08-20
By: Tim Wired
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
-
Not for IT ppl moving into security
- By keith on 03-25-18
By: Raef Meeuwisse
-
AWS Certified Developer Associate
- Step by Step Certification Study Guide, to Pass the Developers Exam with Confidence
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 3 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you aspiring to become an AWS Certified Developer? Are you looking for a comprehensive resource to prepare for the AWS Certified Developer exam? Look no further! This book is your ultimate guide to acing the AWS Certified Developer certification by providing you with a robust set of practice test questions and detailed answers to help you succeed.
-
-
Read by AI
- By Luke on 06-22-24
By: Jamie Murphy
-
Computer Networking Beginners Guide
- Networking for Beginners. A Simple and Easy Guide to Manage a Network Computer System from the Basics
- By: Erick Stack
- Narrated by: Clay Bel le Fort
- Length: 3 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the advent off the wireless technology era, the existing communication technologies were primarily powered by wired technology. From the telephone to the fax machine, communication was not possible without a physical connection between the communication device and the source of the power of the device. For instance, there had to be a connection between a wired telephone and the dial board for communication to be possible. Just as with every other wired device, wireless communication has successfully displaced wired communication.
By: Erick Stack
-
Hacking with Kali Linux
- Step by Step Guide to Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide
- By: Anthony Hack
- Narrated by: Jordan Gunner
- Length: 3 hrs and 18 mins
- Unabridged
-
Overall
-
Performance
-
Story
Would you like to learn professional hacking techniques and strategies? Do you want to protect your data from hackers? Become a hacker yourself with this audiobook...Hacking is a very complicated series of processes that take a lot of effort and there are many things that you will need to learn. Hopefully, this audiobook will give you the most basic information so that you will be able to do this properly.
By: Anthony Hack
-
AWS: A Comprehensive Guide to Mastering Amazon Web Services
- By: Aaron Hudson
- Narrated by: Mat Clista
- Length: 4 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
You are about to learn the limitless power of Amazon Web Services (AWS) to decide whether it is the perfect cloud computing solution for your business! Efficient, high performing, and profitable companies around the world have realized that cloud computing is the secret to massive growth and efficiency in service delivery on a global scale especially because it (cloud computing) allows data access from anywhere in the world.
-
-
Outdated material
- By Stacey on 04-11-25
By: Aaron Hudson
-
Computer Networking First Step
- The Essential Guide to Networking to Introduce Yourself to The Computer Network Through a Top-Down Approach and Various Infrastructures (Programming)
- By: Tim Wired
- Narrated by: Jacob McNatt
- Length: 3 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
While you may have never thought of networking in detail, this book will introduce you to the basics of networking, the different types of networks available, the types of network topologies that you will encounter, the concept of server virtualization, and details of how to handle network breaches.
-
-
If you don't have a text copy of the book, beware
- By A Consumer on 04-08-20
By: Tim Wired
-
Cybersecurity for Beginners
- By: Raef Meeuwisse
- Narrated by: Danny Eastman
- Length: 7 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before. Also featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
-
-
Not for IT ppl moving into security
- By keith on 03-25-18
By: Raef Meeuwisse
-
Future Crimes
- Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
- By: Marc Goodman
- Narrated by: Robertson Dean, Marc Goodman
- Length: 20 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning.
-
-
The book for all of us to help protect us
- By Sandeep on 10-12-15
By: Marc Goodman
-
Kali Linux
- The Complete Guide to Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How to Hack with Kali Linux Tools, Computer Hacking and Networking
- By: Anthony Hack
- Narrated by: Robert Plank
- Length: 3 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
The word “hacking” has preconceived connotations, and most people don't quite grasp the whole concept that goes into the process of hacking. Hackers have a notorious reputation. But there’s a side of hacking that most people aren’t aware of: ethical hacking. You don't hear about the ethical hacking in the news, but there are people out there with the same job description fighting the malicious hackers daily, and they get the bad rep.
By: Anthony Hack
-
Hacking with Kali Linux
- The Comprehensive Guide on Kali Linux for Beginners Learn the Basics of CyberSecurity and Hacking
- By: Murphy Rangel
- Narrated by: Luciano Marin
- Length: 3 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
This audiobook is aimed at beginners, and will take you through the basics of computer hacking. You will learn about the different types of hacking, the primary hacking methods, and different areas of a system that can be hacked. The subsequent section is dedicated about VPN and Tor network. You will discover some basic hacks you can do right away, and be pointed in the direction of software that will assist your hacking escapades.
-
-
Professional reader would help a lot
- By Philip Walker on 03-25-25
By: Murphy Rangel
-
Hacking with Kali Linux
- The Step-by-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
- By: David James Carmack
- Narrated by: Ivan Busenius
- Length: 3 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
Why should you learn hacking? First, to protect yourself. Cyber criminals are everywhere, stealing people’s sensitive data, infecting computers with ransomware, and gaining access to bank accounts. Once you’re aware of the techniques they use, you’ll be able to defend yourself. Second, you can become a “white hat hacker”, a cyber security expert who helps companies find vulnerabilities in their software. You can earn tens of thousands of dollars for discovering a single bug.
-
SQL: The Ultimate and Simplifed Beginner's Guide to Mastery SQL Programming Step by Step - 2020 Edition
- By: Johnny Page
- Narrated by: Austin R Stoler
- Length: 3 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you been stuck searching for solutions to cracking issues in the programming world? Have you searched endlessly to improve you intellect and create a landmark achievement as a genius? Then, look no further because SQL for beginners is the right tool to get you there. Packed with mouthwatering packages every developer would crave for, be sure to become a geek with the latest database management systems - including MySQL, Oracle, and Microsoft's SQL Servers.
By: Johnny Page
-
Computer Networking Beginners Guide
- Ultimate Guide to Master Communication System Including Cisco and Ccna, Wireless, and Cloud Technology, System...and IP Subnetting (Computer Networking Easy)
- By: Ramon Base
- Narrated by: Chris Lynch
- Length: 3 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you a student or a professional who is keen to learn about computer networks? Are you fascinated by the world of computers and every other system that is responsible for the efficient operation of such a wonderful human invention? When you deal with computers on a daily basis, you should be aware of the backbone which supports this incredible invention. The truth is: Computers and technology rule the world today, and most of us are not aware of the network that is responsible for their efficient operation
-
-
Thankful to author for this audiobook
- By Joseph C. Gates on 10-29-19
By: Ramon Base
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- By: Norman Laurence
- Narrated by: Cole Niblett
- Length: 14 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Computer Networking: All in One contains all the knowledge you need to achieve your goals in the computer world.
-
-
Almost unlistenable
- By Kelly A. Ohlert on 12-31-21
By: Norman Laurence
-
You'll See This Message When It Is Too Late
- The Legal and Economic Aftermath of Cybersecurity Breaches
- By: Josephine Wolff
- Narrated by: Kate Reading
- Length: 14 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity incidents make the news with startling regularity. Each breach makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. Cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.
-
-
Not worth your money or time
- By Joseph Jacob on 01-10-21
By: Josephine Wolff
-
Hacking
- What Every Beginner Needs to Know
- By: Mark Anderson
- Narrated by: Trevor Carleen
- Length: 1 hr and 30 mins
- Unabridged
-
Overall
-
Performance
-
Story
Have you watched the news lately? They can't stop talking about hacking. It is portrayed in movies, shouted about in media headlines, and typically gets a lot of attention. In fact, in the run up to the 2016 US Presidential election, there were allegations made nearly every day that the Russians were influencing the election by hacking into American databases and systems. And who can forget Julian Assange and his infamous WikiLeaks that successfully hacked into hundreds of thousands of emails, and whose actions may have kept Hillary Clinton out of the White House.
-
-
Good basic hacking book
- By JetGripz on 01-19-17
By: Mark Anderson
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- By: Richard A. Clarke, Robert K. Knake
- Narrated by: Marc Cashman
- Length: 12 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
-
-
The Author Lacks Critical Thinking
- By Thomas Rose on 08-08-20
By: Richard A. Clarke, and others
-
Cybersecurity
- A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 3 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
If you want to discover how to protect yourself, your family, and business against cyber attacks, then pay attention...Have you been curious about how hackers choose their victims or develop their attack plans? Have you been hacked before? Do you want to learn to protect your systems and networks from hackers? This audiobook serves as a launchpad for learning more about the Internet and cybersecurity. Throughout this audiobook, you will take a journey into the world of cybercrimes and cybersecurity.
-
-
Secure your information through this audiobook.
- By Roger Strong on 08-24-21
By: Quinn Kiser
-
Cyber Security
- The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
- By: Noah Zhang
- Narrated by: Gary Westphalen
- Length: 2 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Cyber security is here to stay. Do you often wonder how cyber security applies to your everyday life, what’s at risk, and how can you specifically lock down your devices and digital trails to ensure you are now “hacked”? Our society has become saturated with internet-connected devices and trackers everywhere. From home routers to your mobile phones, most people are easily hacked if targeted. In this introductory audiobook, we will cover verified steps and tactics on how to increase the level of cyber security in an organization and as an individual.
-
-
Wonderful experience
- By Byars on 10-21-19
By: Noah Zhang