The Human Hack
Field Guide · 9 Chapters · Classic to AI-Powered
Firewalls. Intrusion detection. Encrypted traffic. Multi-factor authentication. Franklin's company had most of these. None of them mattered when an attacker sent one email and Franklin clicked the link.
The most powerful attack vector in cybersecurity isn't a zero-day exploit — it's a well-timed phone call, a convincing email, or a QR code on a parking meter. Social engineering is the art of hacking humans: exploiting trust, authority, urgency, and habit to bypass every technical control ever built. Attackers now have AI doing the research, writing the emails, cloning the voices, and generating the video calls.
Nine chapters. We start with the foundation — what social engineering is and why it works on everyone, including people who know better. Then the full attack arsenal: phishing in all its variants, the SMS and voice and QR attacks that operate outside the inbox, the CEO fraud schemes costing billions per year, the art of pretexting, the physical attacks that don't need a network connection, and the AI-powered frontier that is making everything harder. Then we defend.
Pay attention to Chapter 9. Defense isn't a checklist you complete — it's a reflex you build and a culture you create. The most important thing Franklin could have done wasn't technical. It was knowing it was okay to slow down and ask a question.
— Commander Shepard
