Social engineering attacks manipulate people rather than machines. Instead of exploiting a software bug, the attacker exploits trust, urgency, fear, or authority to convince a victim to hand over credentials, transfer money, or grant access.

Common Social Engineering Techniques

TechniqueHow It WorksExample
PhishingFake email impersonating a trusted brand"Your account has been suspended — click to verify"
Spear phishingTargeted phishing using personal detailsEmail using your real name, boss's name, and job title
VishingVoice phishing over the phoneCaller pretends to be bank fraud department
SmishingSMS-based phishingText: "Your parcel is held — pay fee here"
PretextingFabricated scenario to extract informationPosing as IT support to get your login credentials
BaitingLeaves infected USB drives or uses fake downloadsUSB labelled "Payroll 2025" left in a car park
Quid pro quoOffers help in exchange for accessFake IT helpdesk calls offering to fix a fake problem

Why Social Engineering Works

Attackers exploit well-documented psychological principles:

  • Authority — People comply with those who appear to be in charge
  • Urgency — Time pressure short-circuits critical thinking
  • Scarcity — Fear of missing out drives rushed decisions
  • Familiarity — People trust those who seem to know them
  • Social proof — People follow what they believe others do

How to Protect Yourself

  • Verify unexpected requests through a separate, known channel before acting
  • Never give credentials to anyone over the phone or email — legitimate IT never asks
  • Enable multi-factor authentication so stolen passwords alone are not enough
  • Take time before clicking — urgency is a red flag, not a reason to rush
  • Train regularly — awareness is the strongest defence against social engineering

People Also Ask

What is the most common social engineering attack?
Phishing is by far the most common. The Anti-Phishing Working Group reported over a million phishing attacks per quarter in 2023. Most begin with a convincing-looking email that mimics a trusted brand.
How can I tell if an email is a phishing attempt?
Check the sender's actual email address (not just the display name), hover over links before clicking, look for spelling errors and generic greetings like "Dear Customer," and be suspicious of any email creating urgency around account access or payments.

Related: Data breach | Two-factor authentication | Breach Check