-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

The Art of Social Engineering
By :

All the characters in this chapter’s illustrations are fictional.
The illustrations are inspired by real attacks; therefore, the language used (including spelling and grammatical errors) is intentional.
There are many different types of social engineering attacks and the plurality of factors associated with each of them makes it a bit complicated to categorize them. For example, a technical support scam can be delivered by using a phishing email, a smishing message, or even a vishing attack, so in this chapter, we will try to explain the most common types of social engineering attacks in a way that is easy to understand to enable you to identify them successfully. In the end, the goal is not to be able to label the attack but to successfully recognize it while we are being targeted by any of them.
Now, let’s start our journey and explore the most common types of social engineering attacks.
Change the font size
Change margin width
Change background colour