WhatIs.site
everyday concepts 3 min read
Editorial photograph representing the concept of social engineering
Table of Contents

What Is Social Engineering?

Social engineering, in the cybersecurity context, is the art of manipulating people into giving up confidential information, granting unauthorized access, or performing actions that compromise security. Instead of hacking computers directly, social engineers hack people — exploiting trust, authority, fear, and helpfulness to bypass technical security measures entirely.

It’s the oldest form of hacking and still the most effective. You can spend millions on firewalls, encryption, and intrusion detection systems, but if someone convinces an employee to read their password over the phone, none of that technology matters. As security expert Bruce Schneier put it: “People are the weakest link in security.”

The Attack Types

Phishing is the most widespread attack. Attackers send emails that look legitimate — from banks, tech companies, employers, or government agencies — containing links to fake websites or malicious downloads. The scale is enormous: roughly 3.4 billion phishing emails are sent daily. Most are crude and obvious, but sophisticated phishing is nearly indistinguishable from legitimate communication.

Spear phishing targets specific individuals with personalized messages. Instead of mass-mailing generic bank alerts, the attacker researches their target — using LinkedIn, social media, and company websites — and crafts a convincing message. “Hi Sarah, following up on our conversation at the Austin conference — here are the documents you requested.” The personalization dramatically increases success rates.

Pretexting involves creating a fabricated scenario (pretext) to extract information. An attacker might call a company’s IT helpdesk claiming to be a new employee who can’t access their email, or pose as a vendor needing account verification. The pretext provides a plausible reason for the request, reducing the target’s suspicion.

Baiting uses a physical or digital lure. Leaving USB drives labeled “Salary Information Q4” in a company parking lot exploits curiosity — someone will plug it in. Digital baiting might offer free software downloads that contain malware.

Tailgating (or piggybacking) is physical social engineering — following an authorized person through a secured door. Carrying boxes and asking someone to hold the door open is remarkably effective. Most people won’t challenge someone who looks like they belong.

The Psychology

Social engineering works because it exploits reliable human tendencies.

Authority compliance. People tend to obey authority figures without questioning. An email that appears to come from the CEO requesting an urgent wire transfer is surprisingly effective — employees comply because challenging the boss feels uncomfortable. The 2016 attack on Ubiquiti Networks used this technique to steal $46.7 million.

Urgency and fear. “Your account will be suspended in 24 hours unless you verify your information.” Artificial urgency short-circuits careful thinking. When people feel time pressure, they skip verification steps they’d normally follow.

Reciprocity. If someone does something for you (even something small), you feel obligated to return the favor. A social engineer might help you with a minor technical problem, then casually ask for your login credentials “to check something.”

Social proof. “Everyone in your department has already completed this security update.” If others have done it, it must be safe. Attackers exploit this tendency by referencing colleagues or common practices.

The Damage

The business email compromise (BEC) — a type of spear phishing targeting financial transactions — cost organizations $2.7 billion in 2022 alone, according to the FBI’s Internet Crime Complaint Center. That’s a single attack category.

The 2020 Twitter hack, where teenagers gained access to high-profile accounts (Barack Obama, Elon Musk, Apple) and posted cryptocurrency scams, started with social engineering — the attackers called Twitter employees and convinced them to provide access to internal tools.

The 2011 RSA breach, which compromised the security of the SecurID two-factor authentication system used by thousands of organizations, started with a phishing email containing a malicious Excel spreadsheet. A single employee opening a single file cascaded into one of the most significant security breaches in history.

Defense

Training is the most effective defense. Organizations that regularly train employees to recognize social engineering attacks see phishing click rates drop from 20-30% to under 5%. Simulated phishing exercises — sending fake phishing emails and tracking who clicks — identify vulnerable employees and reinforce awareness.

Verification procedures prevent pretexting attacks. Never provide sensitive information based solely on a phone call or email. Call back on an independently verified number. Use established channels for financial transactions. Require multi-person authorization for large transfers.

Multi-factor authentication (MFA) limits the damage from stolen passwords. Even if a phishing attack captures your password, the attacker can’t access your account without the second factor (a phone code, hardware key, or biometric).

Healthy skepticism is your personal firewall. If something feels off — an unusual request, unexpected urgency, someone you don’t know asking for information they shouldn’t need — trust that instinct and verify before acting.

The uncomfortable truth about social engineering is that it works because we’re human. Our helpfulness, trust, and respect for authority are genuine virtues — and they’re precisely what attackers exploit. The goal isn’t to become paranoid, but to develop a habit of verifying before trusting, especially when something is unexpected or feels pressured.

Frequently Asked Questions

What's the most common type of social engineering attack?

Phishing — fraudulent emails or messages designed to trick recipients into clicking malicious links, downloading malware, or revealing passwords and financial information. Phishing accounts for over 80% of reported security incidents. Variants include spear phishing (targeted at specific individuals), whaling (targeting executives), and smishing (via text messages).

Why does social engineering work so well?

Because it exploits human psychology rather than technical vulnerabilities. People naturally trust authority figures, want to be helpful, fear negative consequences, and act quickly under pressure. Social engineers exploit these tendencies — impersonating bosses, creating urgency, appealing to curiosity, or exploiting helpfulness. No firewall can protect against an employee who willingly gives their password to a convincing caller.

How can you protect yourself from social engineering?

Verify requests independently — if someone calls claiming to be from your bank, hang up and call the bank's official number. Never click links in unexpected emails. Be suspicious of urgency ('act now or your account will be locked'). Use multi-factor authentication so stolen passwords alone aren't enough. And remember: legitimate organizations never ask for passwords via email or phone.

Further Reading

Related Articles