IsThisAScam
Laman UtamaBlogHargaTentangHistoryAPIExtension
Upgrade
MS
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Produk
  • Home
  • Blog
  • Pricing
  • Tentang
  • History
  • Chrome Extension
Resources
  • Developers
  • Dokumentasi API
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Undang-undang
  • Dasar Privasi
  • Terma Perkhidmatan
  • product@zeplik.com

© 2026 Zeplik, Inc. Hak cipta terpelihara.

Built for the calm, the cautious, and the careful.

Home/Glossary/Social Engineering
Glossary · Social Engineering

What Is Social Engineering?

The psychological manipulation of people into performing actions or divulging confidential information. Social engineering exploits human trust, fear, curiosity, and helpfulness rather than technical vulnerabilities.

Quick Definition

The psychological manipulation of people into performing actions or divulging confidential information. Social engineering exploits human trust, fear, curiosity, and helpfulness rather than technical vulnerabilities.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01Social Engineering explained.

Social engineering is the foundation of most cyberattacks. Rather than breaking through firewalls and encryption, attackers target the weakest link in any security system: human psychology. Kevin Mitnick, one of the most famous hackers, said he rarely needed to use technical hacking because social engineering was so effective.

These attacks work because humans are wired to trust, to help, to obey authority, and to respond to urgency. Social engineers exploit these natural tendencies through carefully crafted scenarios that bypass our critical thinking.

Social engineering goes far beyond the digital world. It includes in-person techniques like tailgating through secured doors, impersonating maintenance workers, or searching through trash for sensitive documents (dumpster diving).

02How it works.

01The attacker identifies a target and researches their habits, relationships, and vulnerabilities
02A pretext (cover story) is developed that exploits trust, authority, urgency, or helpfulness
03Contact is made through the most effective channel: email, phone, text, in-person, or social media
04The target is manipulated into revealing information, granting access, or taking a harmful action
05The attacker uses the obtained access or information to achieve their ultimate objective

03Real-world example.

In the 2020 Twitter hack, a 17-year-old used social engineering to convince Twitter employees to provide access to internal tools. By impersonating IT staff, he gained control of accounts belonging to Barack Obama, Elon Musk, and Apple, posting bitcoin scam messages that collected over $100,000.

04How to protect yourself.

01Question any unexpected request, especially those involving urgency, secrecy, or authority
02Verify identities through independent channels before providing information or access
03Follow established procedures — social engineers often ask you to skip security protocols
04Be cautious about information shared on social media that could be used against you
05Train yourself to pause and think before responding to emotionally triggering requests
Related Terms
PretextingBaitingTailgatingPhishingVishing
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →