Home Phishing and social engineering terms

63 terms

Phishing and social engineering terms

Phishing and social engineering are cybersecurity threats that exploit human behavior. In this glossary, you’ll find the most common phishing and social engineering examples and their definitions.

SEO poisoning

SEO poisoning, also known as search engine poisoning (SEP), is a malicious tactic used by cybercriminals to manipulate search engine results in order to promote harmful websites.

Phishing kit

A phishing kit is a set of tools for carrying out phishing attacks — social engineering techniques that seek to trick victims into revealing sensitive information or sending the scammer money.

Likejacking

Likejacking is a social engineering attack where attackers trick internet users into unknowingly "liking" a Facebook page or post.

Whaling

Whaling is a type of social engineering phishing attack that targets specific high-ranking employees.

Website spoofing

Website spoofing is a scam that involves creating a replica of a trusted website to mislead users that the website is authentic.

Vishing

Vishing is a social engineering attack similar to phishing that uses deception and plays with the victim’s emotions – like fear, greed, or sense of urgency – to get personal information out of them.

USB drop attack

A USB drop attack is a method used by attackers to trick individuals into plugging a malicious USB drive into their computers.

URL hijack

A URL hijack involves tricking users into visiting and browsing websites with malicious content or malware.

The importance of phishing and social engineering terminology

Understanding phishing and social engineering terms can help users recognize phishing attacks, avoid malicious email attachments, and otherwise improve personal cybersecurity.

Know what to do

The glossary contains extensive instructions on what to do when you’ve been exposed to phishing emails, smishing attempts, and social engineering attacks.

Understand how cyber threats work

Learning phishing and social engineering terms and their definitions will provide additional insight on how these cyber threats trick users into divulging sensitive information.

Notice the threats before they occur

Understanding the most common red flags of phishing and social engineering attacks will help you prevent scammers from stealing your identity.

Two women learning cybersecurity terminology.

Online security starts with a click.

Stay safe with the world’s leading VPN

Can’t find an answer to your question?

Ask the questions that matter to you — and get answers from our cybersecurity experts.