1. Social engineering: assessing vulnerabilities in practice
2. Barnes, J.E. (2001), “Unilever wants P&G placed under monitor in spy case”, New York Times, September 1, available at: www.nytimes.com/2001/09/01/business/unilever‐wants‐p‐g‐placed‐under‐monitor‐in‐spy‐case.html (accessed October 27, 2011).
3. Ethical hackers: putting on the white hat
4. Flynn, M. (2002), “It takes a hacker”, PC Magazine, Vol. 21 No. 18, p. 26, from Academic Search Complete Database (accessed October 16, 2011).
5. Goessl, L. (2011), “New Netflix phishing scams spreading through email and mobile”, Digital Journal, October 21, available at: www.digitaljournal.com/article/313168 (accessed October 27).