63 terms
Phishing and social engineering terms
Phishing and social engineering are cybersecurity threats that exploit human behavior. In this glossary, you’ll find the most common phishing and social engineering examples and their definitions.
SEO poisoning
SEO poisoning, also known as search engine poisoning (SEP), is a malicious tactic used by cybercriminals to manipulate search engine results in order to promote harmful websites.
Phishing kit
A phishing kit is a set of tools for carrying out phishing attacks — social engineering techniques that seek to trick victims into revealing sensitive information or sending the scammer money.
Likejacking
Likejacking is a social engineering attack where attackers trick internet users into unknowingly "liking" a Facebook page or post.
Whaling
Whaling is a type of social engineering phishing attack that targets specific high-ranking employees.
Website spoofing
Website spoofing is a scam that involves creating a replica of a trusted website to mislead users that the website is authentic.
Vishing
Vishing is a social engineering attack similar to phishing that uses deception and plays with the victim’s emotions – like fear, greed, or sense of urgency – to get personal information out of them.
USB drop attack
A USB drop attack is a method used by attackers to trick individuals into plugging a malicious USB drive into their computers.
URL hijack
A URL hijack involves tricking users into visiting and browsing websites with malicious content or malware.
Typosquatting
Typosquatting is a social engineering attack involving a fake website that the victim accesses by mistyping a URL.
Twishing
Twishing (“Twitter” + “phishing”) is a form of cybercrime carried out through X, formerly known as Twitter.
Tech support scam
A tech support scam is a fraud in which scammers pose as legitimate technical support representatives, typically from well-known technology companies.
Targeted attacks
Targeted attacks refer to complex cyberattacks that concentrate on a particular person, organization, or system.
Tabnabbing
Tabnabbing is a type of phishing attack and cyber exploit that bad actors use to manipulate inactive web pages that users leave open in their browsers.
Spear phishing
Spear phishing is a form of phishing attack directed at specific companies or individuals.
Spam over Internet Telephony
Spam over Internet Telephony is the unwanted distribution of unsolicited voice messages using Voice over Internet Protocol (VoIP) technology.
Social engineering
Social engineering is a psychological manipulation technique that cybercriminals use to get people to give away confidential information or perform a certain action.
SMS spoofing
SMS spoofing, also known as source address spoofing or text message spoofing, is a technique where a sender manipulates the source identifier on a text message to masquerade as someone else.
Smishing
Smishing is a cyberattack that is carried out over text messages.
Shoulder surfing
Shoulder surfing is the practice of physically observing the victim’s device from a close distance, typically over their shoulder.
Scareware
Scareware is a type of cyberattack that involves hackers scaring people into downloading malware by clicking on malicious links or visiting infected websites.
Reshipping
Reshipping refers to a scam that usually involves unsuspecting individuals being tricked into receiving stolen goods and then forwarding them to criminals.
Quid pro quo attack
A quid pro quo attack is a type of social engineering tactic where a cybercriminal promises a victim to deliver a helpful service or provide a benefit in exchange for sensitive information, such as login credentials or personal details.
QR code phishing
QR code phishing (also known as quishing) is a social engineering attack that uses a QR code to trick people into giving their personal data like financial details or login information.
Pretexting
Pretexting is a social engineering attack where the victim is tricked by a fake scenario (a pretext) to perform an action or reveal personal information.
Post-inoculation attack
A post-inoculation attack is a class of cyberattacks that occur after an organization introduces an initial security safeguard, or 'inoculation'.
Piggybacking
Piggybacking is the act of gaining unauthorized access to an account, system, or network by exploiting another subject’s legitimate entry.
Phish-prone percentage
Phish-prone percentage refers to a metric used to assess a company’s vulnerability to a phishing attack.
Pharming
Pharming is a type of cyberattack during which a hacker redirects their victim’s traffic from the original website to a fake one.
One ring scam
A one ring scam, also known as Wangiri fraud, is a type of telephone fraud that originated in Japan and involves tricking victims into calling costly international or premium-rate numbers.
MFA bombing
MFA bombing, alternatively known as multi-factor authentication bombing, is a cyberattack method in which malicious actors seek to inundate a user's multi-factor authentication (MFA) procedures.
Masquerade attack
A masquerade attack refers to a cyber attack where an attacker impersonates a legitimate user or device in order to gain unauthorized access to a network or system.
Lurking
Lurking is the practice of reading and observing an online community without actively participating in any way.
Luring attack
A luring attack is a cyber attack where an attacker tricks a target into compromising their security or divulging sensitive information.
Internet troll
An internet troll is a person who communicates using off-topic or inflammatory messages to enrage individuals or groups and start an online war.
Impersonation attack
An impersonation attack is a dangerous tactic involving hackers posing as authorized users or devices in order to bypass security measures and steal sensitive information from unwitting victims.
Image spam
Image spam is a spamming technique in which textual spam messages are embedded into images attached to the email.
Ice phishing
Ice phishing is a type of scam targeting the people who use cryptocurrency or the blockchain.
HTTPS phishing
HTTPS phishing is a type of cyberattack where attackers impersonate a trusted website that uses the HTTPS protocol to deceive victims into providing sensitive information.
Homograph attack
A homograph attack includes the bad actor using similar characters as another legitimate site and disguising themselves as if they are that site by creating a fake URL that spoofs the real one.
Hoax
A hoax is a message that deceives people into thinking that something is true when it isn’t.
Footprinting
Footprinting is a technique used by ethical hackers to find vulnerabilities in a system, network, or infrastructure.
Facebook stalking
Facebook stalking is following someone's activity and gathering information about them through Facebook.
Email spoofing
Email spoofing is a type of cyberattack where the criminal fakes (spoofs) the sender address of an email message to lull the receiver into a false sense of security.
Email hoax
An email hoax is a type of online scam involving sending out fraudulent emails.
Email attack
An email attack or an email-centric assault is a hostile action conducted via email to infiltrate the recipient's computer, steal confidential data, or disrupt their regular activities.
Dumpster diving attack
A dumpster diving attack is a type of no-tech attack that hackers use to obtain someone’s personal information.
Domain spoofing
Domain spoofing is a type of cyberattack where the attacker creates a fake website or email address that closely mimics a legitimate one.
Dialog box
A dialog box is a small window that pops up on a screen with which a user interacts to complete a task.
Deepfake
Deepfake refers to a form of synthetic media that employs artificial intelligence (AI) and machine learning techniques to produce convincingly realistic, altered audio and visual material.
DarkHotel
DarkHotel is a cyberespionage group that has been active since at least 2007 and is known for targeting high-profile individuals and organizations, like business executives and government officials.
Dark patterns
Dark patterns are design techniques that use tricks or manipulation to lead users to make decisions that are against their interests or prevent them from exercising their free will.
Cyberbullying
Cyberbullying refers to bullying that takes place through digital technologies.
Credential harvesting
Credential harvesting, also known as credential phishing or password harvesting, is a technique cybercriminals employ to obtain usernames, passwords, and other sensitive data from unsuspecting victims.
Conversation hijacking
Conversation hijacking is a type of email attack where the attacker targets specific email accounts and compromises them so that they can spy on their conversations.
CLSID
A CLSID is a serial number that represents a globally unique identifier for any application component in Windows.
Clone phishing
Clone phishing is an attack where a cybercriminal makes a copy of a legitimate email from a trusted sender.
CEO fraud
CEO fraud is a sophisticated cybersecurity threat where fraudsters impersonate high-ranking executives to deceive employees, clients, or vendors into committing fraudulent actions, often involving financial transactions.
Catfishing
Catfishing is a social engineering scam where the attacker creates a fake online persona to target a specific victim on social networks.
Biometric spoofing
Biometric spoofing is the deliberate manipulation or imitation of biometric traits to deceive systems reliant on biometric authentication for security.
Baiting
Baiting is a social engineering attack where the victim is tricked into installing malicious software on their device.
Angler phishing
Angler phishing is a social engineering attack aimed at customers who publicly request assistance from an organization on social media.
Account hijacking
Account hijacking is a type of cyberattack during which a hacker takes control of the victim’s account associated with a computer device or online service.
The importance of phishing and social engineering terminology
Understanding phishing and social engineering terms can help users recognize phishing attacks, avoid malicious email attachments, and otherwise improve personal cybersecurity.
Know what to do
The glossary contains extensive instructions on what to do when you’ve been exposed to phishing emails, smishing attempts, and social engineering attacks.
Understand how cyber threats work
Learning phishing and social engineering terms and their definitions will provide additional insight on how these cyber threats trick users into divulging sensitive information.
Notice the threats before they occur
Understanding the most common red flags of phishing and social engineering attacks will help you prevent scammers from stealing your identity.
Online security starts with a click.
Stay safe with the world’s leading VPN
Explore related articles
Explore related glossary categories
Can’t find an answer to your question?
Ask the questions that matter to you — and get answers from our cybersecurity experts.