Social engineering

Social engineering
Social engineering

Social engineering is the psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not concern the divulging of confidential information.

This differs from social engineering within the social sciences, which does not concern the divulging of confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access. It differs from a traditional “con” in that it is often one of many steps in a more complex fraud scheme.

What are the types?

Social engineering is a term that encompasses a broad spectrum of malicious activity. For the purposes of this article, let’s focus on the five most common attack types that social engineers use to target their victims. These are phishing, pretexting, baiting, quid pro quo and tailgating.

What is the most common method ?

The most common form of social engineering attack is phishing. Phishing attacks exploit human error to harvest credentials or spread malware, usually via infected email attachments or links to malicious websites.

Is this illegal?

This is illegal, so this crime can lead to serious legal penalties to any criminal caught in the act. Engaging in social media engineering can lead to charges classified as misdemeanors. Which can attract fines, jail sentences, and other unpleasant consequences.

What is pretexting?

Pretexting is a form used to manipulate victims into divulging sensitive information. Hackers often research their victims in advance of their first conversation.

How common is this?

According to a 2018 study, 17 percent of people fall victim to this attacks. That means that close to two out of every ten employees you have will unwittingly compromise his or her workstation, or get the entire company’s network in trouble.

How effective is this?


In today’s world, this is recognized as one of the most effective ways to obtain information and break through a defense’s walls. It is so effective because technical defenses (like firewalls and overall software security) have become substantially better at protecting against outside entities.