Watch how a chief engineer and a social engineer impersonated IT staff to gain physical access and deploy malware via a USB drive. Legitimacy and confidence were key to their success. #SocialEngineering #CyberSecurity #Malware #ITSecurity #Hacking