Glossary

What are the 14 most common social engineering attacks and how can you defend against them?

Published on
September 30, 2025

What is social engineering and why does it matter?

Social engineering is the manipulation of people to reveal confidential information or perform actions that breach security. Attackers exploit trust, curiosity, fear, or authority to trick victims, often bypassing technical safeguards. Because humans are the weakest link, even well‑secured networks can be compromised through deceptive tactics. Recognizing the psychological triggers behind these attacks is the first step to building resilient defenses. Training and awareness programs reduce the success rate of social engineering attempts.

What is pharming and how can it be prevented?

Pharming redirects users from legitimate websites to fraudulent ones, often by corrupting DNS settings or injecting malicious code into browsers. Victims enter credentials on the fake site, thinking it’s authentic, leading to credential theft. To defend against pharming, enforce DNS security extensions (DNSSEC), use trusted DNS resolvers, and keep browsers and operating systems up‑to‑date. Regularly audit DNS records for unauthorized changes and educate users to verify URLs before logging in.

How does tabnabbing (or reverse tabnabbing) work?

Tabnabbing exploits inactive browser tabs by changing the original page’s content to a login portal after the user switches back. The attacker then captures entered credentials. Mitigation includes using the rel="noopener noreferrer" attribute on outbound links and ensuring browsers are updated. Encourage users to close unused tabs and avoid entering credentials on tabs they haven’t recently visited.

What is scareware and how can organizations stop it?

Scareware displays fake alerts claiming the computer is infected, urging users to purchase bogus security software. It preys on fear to extract money or install malware. Deploy reputable anti‑malware solutions, block pop‑ups, and train staff to recognize legitimate security warnings. Any unexpected purchase prompts should be verified with the IT department before action.

What are the different email‑based social engineering attacks?

Email remains a prime vector for social engineering, including Business Email Compromise (BEC), spam, phishing, spear‑phishing, whaling, and angler phishing. BEC impersonates executives to authorize fraudulent transfers, while spear‑phishing targets specific individuals with tailored messages. Deploy DMARC, DKIM, and SPF protections and regularly scan inbound emails with Palisade’s email security score tool. Combine technical controls with user training to spot suspicious cues.

What is access tailgating and how can physical security help?

Access tailgating occurs when an unauthorized person follows an employee through a secured door, exploiting courtesy. Physical controls such as badge readers, turnstiles, and mantraps prevent tailgating. Encourage a “no‑piggy‑backing” policy and install security cameras to monitor entry points.

How does baiting lure victims and what safeguards exist?

Baiting offers a tempting reward—like free software or a movie download—to entice users into providing credentials or installing malware. To mitigate baiting, restrict downloads to approved sources, use web filtering, and educate employees to verify offers before clicking. Implement endpoint protection that blocks unknown executables.

What is DNS spoofing and how can it be detected?

DNS spoofing (cache poisoning) manipulates DNS responses to direct users to malicious sites. Use DNSSEC to authenticate DNS data and monitor for anomalous DNS traffic. Regularly test DNS resolvers with tools that simulate spoofing attempts.

What is pretexting and how can organizations guard against it?

Pretexting involves creating a fabricated scenario—such as posing as IT support—to extract sensitive information. Verify identities through secondary channels before sharing credentials or data. Implement strict verification procedures for any request involving privileged access.

What are physical breaches and why are they a concern?

Physical breaches include theft of laptops, storage drives, or confidential documents, often enabled by tailgating or unsecured facilities. Secure workspaces with locked cabinets, cable locks, and encryption on devices. Conduct regular audits of physical asset inventories.

What is a watering‑hole attack and how can it be mitigated?

Attackers compromise websites frequently visited by a target group, injecting malware to infect visitors. Use web‑gateway filtering, keep browsers patched, and employ endpoint detection and response (EDR) solutions. Monitor network traffic for unusual outbound connections from compromised hosts.

How does a quid‑pro‑quo scam operate?

Quid‑pro‑quo scams promise a benefit—like technical support—in exchange for personal data. Verify the legitimacy of unsolicited offers and never share credentials over the phone unless the caller’s identity is confirmed through official channels.

What is diversion theft and how does it affect businesses?

Diversion theft intercepts shipments or redirects digital transfers to fraudulent destinations. Use multi‑factor authentication for financial transactions and confirm delivery addresses through secondary verification.

How does a honey trap compromise security?

Honey traps use romantic or sexual relationships to coax victims into revealing confidential information. Encourage a culture of reporting suspicious personal interactions and enforce clear policies on sharing corporate data.

What are advance‑fee scams and how can they be avoided?

Advance‑fee scams lure victims with promises of large rewards in exchange for an upfront payment, such as the classic “Nigerian prince” scheme. Train staff to recognize red‑flag language like “guaranteed profit” and to verify any unsolicited financial proposals with senior management.

Quick Takeaways

  • Social engineering exploits human psychology, not just technology.
  • Pharming, tabnabbing, and DNS spoofing target web traffic and browsers.
  • Email attacks—phishing, BEC, and whaling—remain the most prevalent vectors.
  • Physical tactics like tailgating and diversion theft bypass digital defenses.
  • Implement DMARC, DKIM, and SPF, and use Palisade’s email security tools for protection.
  • Regular security awareness training reduces the success rate of deceptive attacks.
  • Combine technical controls with strict verification policies for all requests.

Frequently Asked Questions

  • Can technical solutions alone stop social engineering? No—while tools like firewalls and email filters block many attacks, the human element remains vulnerable. Continuous training and verification processes are essential.
  • How often should phishing simulations be run? Quarterly simulations keep awareness high and help identify gaps in employee knowledge.
  • Is DMARC enough to prevent email fraud? DMARC, combined with DKIM and SPF, significantly reduces spoofing, but it should be part of a broader email security strategy.
  • What physical controls stop tailgating? Badge readers, turnstiles, and a strict “no‑piggy‑back” policy are effective deterrents.
  • Where can I test my organization’s email security? Use Palisade’s email security score to evaluate DMARC, DKIM, and SPF configurations.
Email Performance Score
Improve results with AI- no technical skills required
More Knowledge Base