Relacionar Columnas Social Engineering Versión en línea Social Engineering Techniques por Kathy San 1 Spear Phishing 2 Vishing 3 Pharming 4 Tailgating 5 Smishing 6 Eliciting information 7 Spam 8 Whaling 9 Shoulder Surfing 10 Phishing 11 Dumpster Diving 12 SPIM A technique that is used to discreetly gather information. Usually, a casual conversation to extract information. A technique that involves following someone into a secure area. Attacker spying over your shoulder watching to steal personal information. Attacker who uses phone calls or leaving voice messages defrauding to gain sensitive information over the phone. An email attack targeting specific individual or group. Attackers who gain useful information searching through trash. A website attack technique that hackers use to redirect users from a legitimate site to a fake site. A phishing attack that targets high-ranking officials such as a CEO or other top-level executives. Unwanted junk email sent out in bulk. Target emails. Usually spam with typo errors and requesting users to click on a malicious link. An attack using text messages. Spam messages sent through instant messages like WhatsApp, Skype, or other chatting platforms.