Social Engineering: How it works and how to detect it.
- M4rcus Mann
- Feb 20, 2023
- 2 min read

Social engineering is a tactic used by cybercriminals to manipulate people into divulging sensitive information or performing a certain action. Instead of using technology to gain access to systems or networks, social engineers use deception and manipulation to trick people into giving them what they want.
Here are some common types of social engineering:
Phishing: This is a type of social engineering where an attacker sends an email or text message pretending to be a legitimate organization, such as a bank or a government agency, and asks for personal information, such as login credentials or financial information. The message often includes a link or an attachment that, when clicked, will install malware or take the victim to a phishing website.
Vishing: This is a type of social engineering where an attacker calls a victim pretending to be a legitimate organization and asks for personal information.
Baiting: This is a type of social engineering where an attacker offers something of value, such as a prize or a free service, to entice a victim to give up personal information or perform a certain action.
Pretexting: This is a type of social engineering where an attacker creates a fake identity or pretext to gain access to sensitive information.
Scareware: This is a type of social engineering where an attacker creates a sense of urgency or fear to make a victim take a certain action, such as purchasing a product or giving up personal information.
To detect social engineering attempts, it is important to be aware of the tactics used by attackers and to be suspicious of unsolicited requests for personal information or suspicious emails or phone calls. Here are some tips on how to detect social engineering:
Be skeptical: If something seems too good to be true or if you are being asked for personal information by an unsolicited caller or email, be skeptical and do not give out any information.
Verify the identity: Before giving out personal information, verify the identity of the person or organization making the request. You can do this by contacting the organization directly using a phone number or email address that you know to be legitimate.
Watch for red flags: Be aware of red flags, such as spelling and grammar mistakes, generic greetings, and urgent requests for personal information.
Be wary of clicking on links: Do not click on links or download attachments from unknown or unexpected sources, as they could contain malware or take you to a phishing website.
Educate yourself: Stay informed about the latest social engineering tactics and best practices for detecting and preventing them.
In conclusion, social engineering is a tactic that cybercriminals use to trick people into giving up sensitive information or performing a certain action. By being aware of the tactics used by attackers and by following best practices for detecting and preventing social engineering, you can help protect yourself and your organisation from these threats.





