Hacker Techniques: Social Engineering

What is it?

Social engineering involves manipulating people, rather than computers, to achieve a goal. It’s usually combined with other more traditional hacker techniques.

What kind of goal?

Hackers love to socially engineer other hackers, usually by tricking them into divulging sensitive information. They will try and build trust over time, with the intent to expose the other hacker’s identity or network. Social engineering is also often used to attack employees of large companies in an attempt to get access to valuable systems.

hacker

What does it look like?

Have you ever received a spam email that claims you are due a large inheritance or had someone call you claiming that you’ve been in a car accident recently? These are forms of social engineering, albeit at a very low level. Hackers will take things further, perhaps impersonating you or your friends/family/colleagues to get what they want. They may even go undercover and enter a building to gain access to restricted areas.

Hacker Techniques: Social Engineering

SPYSCAPE
Share
Share to Facebook
Share with email

What is it?

Social engineering involves manipulating people, rather than computers, to achieve a goal. It’s usually combined with other more traditional hacker techniques.

What kind of goal?

Hackers love to socially engineer other hackers, usually by tricking them into divulging sensitive information. They will try and build trust over time, with the intent to expose the other hacker’s identity or network. Social engineering is also often used to attack employees of large companies in an attempt to get access to valuable systems.

hacker

What does it look like?

Have you ever received a spam email that claims you are due a large inheritance or had someone call you claiming that you’ve been in a car accident recently? These are forms of social engineering, albeit at a very low level. Hackers will take things further, perhaps impersonating you or your friends/family/colleagues to get what they want. They may even go undercover and enter a building to gain access to restricted areas.


Does it work?

Absolutely. Countless people and organizations have been hacked due to social engineering. Human error is the number one cybersecurity weakness.

What can I do?

Knowledge is power. Learn how social engineering works so you don’t fall prey. This Social Engineering website offers in-depth resources, videos, podcasts, and blog posts on the subject.

Read mORE

RELATED aRTICLES

This story is part of our weekly briefing. Sign up to receive the FREE briefing to your inbox.

Gadgets & Gifts

Put your spy skills to work with these fabulous choices from secret notepads & invisible inks to Hacker hoodies & high-tech handbags. We also have an exceptional range of rare spy books, including many signed first editions.

Shop Now

Your Spy SKILLS

We all have valuable spy skills - your mission is to discover yours. See if you have what it takes to be a secret agent, with our authentic spy skills evaluation* developed by a former Head of Training at British Intelligence. It's FREE so share & compare with friends now!

dISCOVER Your Spy SKILLS

* Find more information about the scientific methods behind the evaluation here.