Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

How social engineering

attacks work
Phishing
Emails and text messages
mimicking important
businesses, encouraging you
to provide your information
or update your records.
Spear phishing
A more targeted version of
phishing, meaning more
personalized emails or text
messages.
Baiting
Using human nature’s greed or
curiosity by luring out information
with false promises of products
and/or services – this could be an
email, message, pop-up or on a
website.
Scareware
Emails and/or pop ups may
appear on your computer
warning of false threats and
stating you need to use a
certain security tool to fix
the issue.
Pretexting
The attacker will use a false
story to gain trust, often posing
as someone with authority who
needs your information for a
valid reason – usually received
through email or text message.
Follow us for
more insights

You might also like