Ever been in these social engineering situations?

You could be next. Take a look at these examples of how a security consultant was recently hired to infiltrate a company’s buildings and networks – mirroring a crook’s social engineering attempts to get at sensitive personal and corporate data. This was all done...