Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. In cybercrime, these “human hacking” scams tend to lure unsuspecting users into exposing data, spreading malware infections, or giving access to restricted systems. Attacks can happen online, in-person, and via other interactions.
Scams based on social engineering are built around how people think and act. As such, social engineering attacks are especially useful for manipulating a user’s behavior. Once an attacker understands what motivates a user’s actions, they can deceive and manipulate the user effectively.
How Does Social Engineering Work?
- information on you or a larger group you are a part of.
- Infiltrate by establishing a relationship or initiating an interaction, started by building trust.
- Exploit the victim once trust and a weakness are established to advance the attack.
- Disengage once the user has taken the desired action.
- Fear
- Excitement
- Curiosity
- Anger
- Guilt
- Sadness
These Emotions very useful for social Engineering attacks..
Types of Social Engineering
Phishing attacks
- Spam phishing, or mass phishing, is a widespread attack aimed at many users.
- Spear phishing and by extension, whaling , use personalized info to target particular users.
Scareware Attacks
Scareware is a form of malware used to frighten you into taking an action. This deceptive malware uses alarming warnings that report fake malware infections or claim one of your accounts has been compromised.



