November 13, 2024
Package delivery scams: What they are and how to avoid them
Package delivery scams rely on getting you to share your personal information. Learn how to recognize delivery fraud.
Learn moreSocial engineering is designed to manipulate others by preying on our trust of what’s familiar. Learn how to identify social engineering tactics and protect yourself from being scammed.
Social engineering is any manipulation technique that exploits human behavior and error in order to gain access to sensitive or confidential information. Where some scammers would steal someone’s personal information, social engineers convince their victims to willingly hand over the requested information like usernames and passwords.
Stay safer online with one easy-to-use app1
1Microsoft 365 Personal or Family subscription required; app available as separate download
Social engineering attacks are generally not quick. Instead of a smash-and-grab robbery, social engineers tend to take a prolonged approach that starts with research. The cycle of this type of manipulation might go like this:
This tactic can be especially dangerous because it relies on human error, rather than a vulnerability in software. Humans are much more unpredictable, and their mistakes can be hard to identify or anticipate. Malware may exploit a specific weakness in a piece of code, making it a relatively straightforward fix once it’s identified. Human manipulation is harder to untangle.
Unfortunately, humans have developed several ways to deceive each other. Social engineering techniques tend to hinge on the attacker’s use of confidence and persuasion to convince their targets to take actions that would otherwise be out of character. Targets may find themselves being misled into a few specific behaviors that are hallmark traits of social engineering:
Understanding that social engineering attacks are rooted in deception may help you sniff them out before you become a victim. Here are a few different types of social engineering attacks, so you’ll know how to spot a scam.
Pretexting uses a deceptive identity as the reason to establish trust with a target. This may involve an impersonation of a vendor or facility employee, and once a target is convinced that the identity is legitimate, the exploitation continues in earnest. An attacker may pretend to be a coworker, a police officer, or someone else who may inspire trust in the target.
This kind of social engineering, also called piggybacking, and occurs when an attacker follows someone into an area that they don’t have authorized access to. Attackers may count on social courtesy like door holding, to access private areas and the private information within them. Pretexting can play a role in tailgating, too, especially if the attacker is dressed like an employee of a private location.
This is a well-known way to obtain personal information from an unwitting target. This kind of attack works when an attacker pretends to be a trusted institution (like your bank) or individual (like a family member) to persuade you to share private personal data. There are a few different types of phishing, but the basic premise of deceiving a target with the goal of obtaining private information is the same.
This type of social engineering technique is built on the premise of a target taking the bait. An attacker will put something desirable in front of a victim and hope that it entices them. Online, this might look like a downloadable attachment in an email or on a social media post that has malware embedded.
A physical example might be a seemingly abandoned USB stick in a public place. A curious target might plug it into their computer to see what’s on it, and the malware loaded on the device will infect the target’s computer.
While social engineering attacks can be sophisticated, they can be prevented. If you’re smart about your privacy and security, you can beat attackers at their own game.
It’s the Office you know, plus the tools to help you work better together, so you can get more done—anytime, anywhere.
Buy Now