This video belongs to the openHPI course Digital Identities. Do you want to see more?
Previous
2.2 Identity Theft − Social Engineering Attacks on Users
Next
2.3 Identity Theft − Social Engineering Attacks on Providers