Social engineering involves manipulating individuals into performing actions or divulging ____ information. Common tactics include phishing — sending deceptive emails to ____ personal data — and blagging (pretexting), where attackers fabricate scenarios to obtain information. Shouldering refers to observing someone’s private information over their ____, such as ATM PINs. Tailgating occurs when unauthorised individuals follow authorised ____ into restricted areas. Eavesdropping involves secretly ____ to private communications. Name generator attacks exploit predictable answers to security questions, while pharming redirects users from ____ websites to fraudulent ones. For example, in 2024, Arup, a British engineering firm, suffered a £25.4 million loss due to a ____ scam where criminals used AI-generated voices and images to deceive employees into transferring funds. Stay vigilant, as the weakest link in cybersecurity is often the ____ element. Remember, in the digital realm, trust but verify!

Missing Words - Non-Automated Risks / Social Engineering

Leaderboard

Visual style

Options

Switch template

Continue editing: ?