Fact-checked by Grok 2 weeks ago
References
-
[1]
What Is Pretexting? | IBMPretexting is the use of a fabricated story, or pretext, to gain a victim's trust and trick or manipulate them into sharing sensitive information.What is pretexting? · How pretexting works
-
[2]
What Is Pretexting? - Definition & Attack Examples | Proofpoint USPretexting is a social engineering attack where the attacker creates a fabricated identity or scenario to persuade a victim to divulge confidential information.What Is Pretexting? · How Pretexting Works · Real-World Examples of...
-
[3]
Social Engineering: Pretexting and ImpersonationFeb 20, 2020 · Pretexting is a form of social engineering where a criminal creates a fictional backstory that is used to manipulate someone into providing private information.
-
[4]
What Is Pretexting? Definition, Examples and Attacks - FortinetPretexting is a form of social engineering tactic used by attackers to gain access to information, systems, or services by creating deceptive scenarios.Missing: sources | Show results with:sources
-
[5]
What is Pretexting? A Guide to This Social Engineering AttackFeb 1, 2024 · Pretexting usually involves more research and preparation by the attacker than other types of social engineering attacks. The attacker needs to ...Missing: distinction | Show results with:distinction
-
[6]
What Is Pretexting? - Palo Alto NetworksPretexting is a form of social engineering where attackers impersonate trusted entities to extract sensitive information or gain unauthorized access.<|control11|><|separator|>
-
[7]
What Is Pretexting? Definition, Examples, Attacks & More - ZscalerPretexting is a form of social engineering attack in which a scammer creates a plausible scenario to bait victims into divulging sensitive information.
-
[8]
What is Pretexting? Attacks, Examples & Techniques - SentinelOneJul 22, 2025 · Pretexting is a form of social engineering wherein an attacker creates a fabricated scenario to scam the target into exposing secret information ...Missing: credible | Show results with:credible
-
[9]
6 Types of Social Engineering Attacks and How to Prevent ThemJul 11, 2024 · Pretexting is a type of social engineering technique where the attacker creates a scenario where the victim feels compelled to comply under ...
-
[10]
What is pretexting in cybersecurity? - HuntressOct 3, 2025 · Pretexting is a sneaky social engineering attack where bad actors make up a believable story (a "pretext," if you will) to trick someone into ...
-
[11]
The History of Social Engineering - Mitnick SecurityIncredulously, the earliest accounts of social engineering-like strategic hoodwinking trace back to the Trojan War in 1184 B.C.
-
[12]
Social Engineering and how it affects your coverage | Colony WestThe earliest form of 'pretexting' comes from the story in the bible where the Devil tempts Adam and Eve with an apple. Early forms of 'baiting' can be seen with ...Missing: origins | Show results with:origins
-
[13]
Victorian Trolling: How Con Artists Spammed in a Time Before EmailOct 29, 2013 · ... 19th and early 20th centuries that were part of an international con known as the Spanish Prisoner Scheme. “In this confidence trick,” he ...Missing: pretexting | Show results with:pretexting
-
[14]
How Scams Worked In The 1800s : NPR History Dept.Feb 12, 2015 · The 1800s were the Golden Age of schemes. The term "confidence man" or "con man" was probably coined midcentury and, according to the New York Times, the ...Missing: tricks pretexting
-
[15]
Famous Social Engineering Attacks: 12 Crafty Cons - Meritas GroupAug 12, 2019 · Kevin Mitnick's wild run. Kevin Mitnick was one of the most notorious hackers of the '80s and '90s computer age. His exploits were driven by ...
-
[16]
AIDS Trojan | PC Cyborg | Original Ransomware - KnowBe4The AIDS trojan was created by a biologist Joseph Popp who handed out 20,000 infected disks to attendees of the World Health Organization's AIDS conference. The ...
-
[17]
Social Engineering 2.0 - Communications of the ACMSep 4, 2025 · 2. Deepfake Audio and Video. Voice cloning used to work well only when fed hours of recording for training. Now, a 30-second clip is enough ...<|control11|><|separator|>
-
[18]
(PDF) Defining Social Engineering in Cybersecurity - ResearchGateMay 6, 2020 · of reverse social engineering, in which a social engineer, e.g.. first creates a network failure, and make victims believe that. the attacker is ...
-
[19]
What is Reverse Social Engineering? And How Does It Work? | AwareReverse Social Engineering is a cyberattack, targeting individuals by making direct contact and compelling them into divulging sensitive data.
-
[20]
[PDF] MASTER'S THESIS - Social Engineering and Influence - DiVA portalTypical examples of reverse Social Engineering attacks in Baker et al.'s approach are: an attacker who creates a problem in the facility and then visits as a ...<|control11|><|separator|>
-
[21]
What Is a Social Engineering Attack? - Mitnick Security ConsultingDec 4, 2022 · Social engineering is a hacking technique used by criminals to trick employees into taking action or providing information that leads to the ...Missing: history | Show results with:history
- [22]
- [23]
-
[24]
Empirical Analysis of Weapons of Influence, Life Domains, and ... - NIHCialdini [25] described six such weapons of influence: reciprocation, liking, scarcity, social proof, authority, and commitment. A seventh weapon, perceptual ...
-
[25]
[PDF] HUMAN FACTORS IN CYBERSECURITY: A CROSS-CULTURAL ...Oct 27, 2025 · Role of Trust. Trust plays a vital role in cybersecurity, specifically in social engineering attacks. Social engineering is a method used by ...
-
[26]
[PDF] Human Factors in Web Authentication - UC Berkeley EECSFeb 6, 2009 · One threat to Web authentication is phishing, a social engineering ... confirmation bias [89], a human tendency to overweight confirming ...
-
[27]
[PDF] L18: Social Engineering - Abhi Shelat - Northeastern UniversityCognitive biases are leveraged in all three steps. Page 50. Mitnick on Pretexting. “When you use social engineering, or 'pretexting', you become an actor.
-
[28]
The psychology of the internet fraud victimization of older adults - NIHSep 5, 2022 · James et al. (2014) found that age is positively correlated with the level of susceptibility to fraud, especially as reported by news and media ...Missing: pretexting | Show results with:pretexting
-
[29]
Vulnerability to Financial Scams Among Older Adults: Cognitive and ...Dec 26, 2020 · Older adults with smaller social networks and less social support were more likely to report both exposure and vulnerability to scams. Higher ...<|control11|><|separator|>
-
[30]
A Comprehensive Review of Factors Influencing User Susceptibility ...The most frequent dependent variable used in the reviewed studies is susceptibility to social engineering attacks (N = 11). Susceptibility to social-engineering ...
-
[31]
The Role of Cognitive Biases Towards Social Engineering-Based ...Dec 12, 2023 · This paper focuses on the contributions of cognitive biases towards successful social engineering attacks.
-
[32]
9 Cognitive Biases Hackers Exploit During Social Engineering AttacksMay 9, 2023 · Optimism Bias: Overestimating the probability of positive events while underestimating the probability of adverse events. Example: Phishing ...
-
[33]
What Is A Social Engineering Attack? (& How To Prevent Them)Recent research suggests that vishing alone has a success rate of 37%, but this increases to 75% when combined with email phishing.<|control11|><|separator|>
-
[34]
It all adds up: Pretexting in executive compromise | IBMPretexting is an inherently human attack vector that exploits the social nature of work. While it's impossible for C-suite members to eliminate their human ...Missing: role- based assumptions
-
[35]
2025 Data Breach Investigations Report - VerizonSocial Engineering. Phishing and pretexting are top causes of costly data breaches. Discover how to help prevent attacks by blocking connected devices from ...
-
[36]
Kevin Mitnick, hacker and FBI-wanted felon turned security guru ...Jul 20, 2023 · Mitnick had first been arrested for computer crimes at age 17 for brazenly walking into a Pacific Bell office and taking a handful of ...
-
[37]
Malicious Life Podcast: Kevin Mitnick, Part 2 - CybereasonMitnick decided to get to the bottom of the matter: he hacked Pacific Bell and obtained Eric's phone number. The next step was finding out his address. “Posing ...Missing: examples | Show results with:examples
-
[38]
The bizarre story of the inventor of ransomware | CNN BusinessMay 16, 2021 · ... Health Organization's AIDS conference in ... Eddy Willems with his original floppy disc with ransomware from 1989. Courtesy Eddy Willem.
-
[39]
Scandal on tap | Media | The GuardianDec 4, 2006 · He is bringing a spate of prosecutions against the private eyes who some journalists regularly use as cut-outs to make pretext phone calls to ...
-
[40]
What is pretexting? Definition, examples, and attacks - CSO OnlineSep 20, 2024 · Pretexting is a social engineering attack that employs a fabricated scenario and character impersonation to win trust and gain access to data and accounts ...
-
[41]
Hewlett-Packard under investigation in spying scandal - The GuardianSep 7, 2006 · HP said its investigators had used a method known as "pretexting" - disguising their true identity - to obtain Mr Keyworth's phone records. The ...
-
[42]
HP Spying Scandal Offers Window into Board Battles - NPROct 12, 2006 · HP's investigators secretly gathered phone records and tailed the board members' relatives and even dug through people's trash in an effort to ...
-
[43]
- HEWLETT-PACKARD'S PRETEXTING SCANDAL - GovInfoOn September 6, 2006, H-P publicly disclosed to the Securities and ... pretexting was taking place based upon the information I got from HP. That ...
-
[44]
Phone hacking can extend beyond voice mail - CNN.comJul 8, 2011 · News of the World appears to have exploited a mechanism in mobile-phone carriers' systems that allows people to access voice-mail messages ...
-
[45]
Phone hacking: how News of the World's story unravelledJul 8, 2011 · At the trial it emerged that five others had their phones or messages hacked into – none of whom were members of the Royal family, subjects of ...
-
[46]
Timeline: News of the World phone-hacking row - BBCJul 11, 2011 · The News of the World has ceased publication after 168 years, as anger mounts over allegations of phone hacking and corruption by the paper.
-
[47]
Arup revealed as victim of $25 million deepfake scam ... - CNNMay 17, 2024 · Hong Kong police said in February that during the elaborate scam the employee, a finance worker, was duped into attending a video call with ...
-
[48]
Company worker in Hong Kong pays out £20m in deepfake video ...Feb 5, 2024 · An employee at an unnamed company claimed she was duped into paying HK$200m (£20m) of her firm's money to fraudsters in a deepfake video conference call.<|separator|>
-
[49]
Vishing Attacks Surge 442%: Here's How We're Simulating ThemJun 19, 2025 · Vishing attacks are spiking, and they're powered by AI voice clones and social engineering. Here's how to prevent vishing with real-world ...
-
[50]
FTC Kicks off "Operation Detect Pretext" | Federal Trade CommissionJan 31, 2001 · The Gramm-Leach-Bliley Act ("GLB") prohibits individuals from obtaining a customer's information from a financial institution or directly ...
-
[51]
[PDF] How To Comply with the Privacy of Consumer Financial Information ...Jul 1, 2002 · “Gramm-Leach-Bliley Act Financial Privacy and Pretexting.” Page 3. -i ... The GLB Act prohibits financial institutions from sharing account ...
-
[52]
Telephone Records and Privacy Protection Act of 2006 - Congress.gov... telephone company employees selling data to unauthorized data brokers; (B) ``pretexting'', whereby a data broker or other person represents that they are an ...
-
[53]
FTC Testifies on the Sale of Consumers Phone RecordsFeb 1, 2006 · “While pretexting to acquire telephone records has recently become more prevalent, the practice of pretexting is not new,” the testimony states.
-
[54]
Penal Code § 502 PC – Unauthorized Computer Access and FraudCalifornia Penal Code § 502 PC prohibits accessing another person's or company's computer, data, software, or a computer network without permission.Missing: pretexting impersonation
-
[55]
Unauthorized Computer Access and Fraud - California Penal Code ...PC 502 covers a wide range of ways someone can commit unauthorized computer access. For example, Penal Code 502(c), the most common form, makes it a crime to ...Missing: pretexting | Show results with:pretexting
-
[56]
Art. 5 GDPR – Principles relating to processing of personal dataRating 4.6 (10,116) Personal data shall be: processed lawfully, fairly and in a transparent manner in relation to the data subject ('lawfulness, fairness and transparency'); ...Article 89 · Lawfulness · Recital 39Missing: deceptive | Show results with:deceptive
-
[57]
A guide to the data protection exemptions | ICOThis part of the Guide focuses on the exemptions in Schedules 2-4 of the DPA 2018. We give guidance on the exceptions built in to the UK GDPR in the parts of ...Missing: pretexting | Show results with:pretexting
-
[58]
Telephone Records Seller Settles FTC ChargesDec 17, 2007 · The settlement bars the defendants from marketing or selling consumers' phone records and requires them to give up their ill-gotten gains.
-
[59]
DOJ Doubles Down on Warnings Against AI MisuseMar 14, 2024 · ... AI policy, including regarding corporate compliance issues. The DOJ's message is clear: "Fraud using AI is still fraud. Price fixing using ...
-
[60]
[PDF] an inquiry into the culture, practices and ethics of the press reportNov 29, 2012 · Page 1. The. Leveson. Inquiry culture, practices and ethics of the press. AN INQUIRY INTO THE CULTURE,. PRACTICES AND ETHICS OF THE. PRESS.
-
[61]
Leveson inquiry: Guardian journalist justifies hacking if in the public ...Dec 6, 2011 · Guardian investigations editor David Leigh says a 'certain amount of guile' can be needed to find evidence of corruption.
-
[62]
Letter to Ethics Board Concerning Attorneys' Use of Pretexting - EPICFeb 21, 2006 · We believe that pretexting is incompatible with ABA Model Rules 1.2, 3.4, 4.1, 4.4, and 8.4. We provide documentation below of the mounting ...
-
[63]
ISC2 Code of EthicsAll information security professionals who are certified by ISC2 recognize that such certification is a privilege that must be both earned and maintained.
-
[64]
The ISC2 code of ethics - Infosec InstituteThe ISC2 code of ethics is a collection of requirements that apply to how you act, interact with others (including employers) and make decisions as an ...
-
[65]
What is Social Engineering? - Palo Alto NetworksLoss of reputation and erosion of customer trust. All of these are difficult to recover from. The long-term effects of social engineering on security involve ...How Does Social Engineering... · Common Strategies Used By... · Notable Social Engineering...Missing: societal | Show results with:societal
-
[66]
Pretexting in Cybersecurity: What You Need to Know - SearchInformAt its core, pretexting is an elaborate act of deception. It involves creating a fabricated scenario, or "pretext," to manipulate individuals into divulging ...<|control11|><|separator|>
-
[67]
[PDF] Ethical Frameworks and Computer Security Trolley Problemsand in particular utilitarianism and Kantian deontological ethics, respectively (Section ...
-
[68]
Computer Security Research, Moral Dilemmas, and Ethical ...Aug 2, 2023 · Deontological ethics centers questions about duties (deon) and rights. Under deontological ethics, one focuses on asking what one owes others ...Missing: pretexting | Show results with:pretexting
-
[69]
[PDF] Building a Cybersecurity and Privacy Learning ProgramSep 1, 2024 · This long-awaited update to the 2003 NIST Special. Publication (SP) 800-50, Building an Information Technology Security Awareness and Training.Missing: pretexting | Show results with:pretexting
-
[70]
Security Awareness Training - SANS InstituteA library of over 50 training modules across 6 tracks, curated by SANS Subject Matter Experts to reduce risk, increase awareness and mature programs.Download Now · Career Development · Learn More
-
[71]
SANS Security Awareness Suite - American Bankers AssociationSocial Engineering (4 minutes) This module explains and illustrates different types of social engineering attacks and how people can detect and defend against ...
-
[72]
KnowBe4 Report Reveals Security Training Reduces Global ...May 13, 2025 · KnowBe4's 2025 Phishing by Industry Benchmarking Report shows a drop in the global Phish-prone TM Percentage (PPP) to 4.1% after 12 months of security training.
-
[73]
A Guide to ISO 27001:2022 Security Awareness TrainingAug 8, 2024 · ISO 27001, Clause 7.3, requires staff to be aware of the ISMS and information security. Learn how to build a security awareness program.
-
[74]
Information Security Awareness, Education, and Training | ISMS.onlineFor example, the organisation may need to put in place security awareness training at least annually, or as required by the risk assessment, for all employees ...
-
[75]
Security Awareness Compliance RequirementsNIST provides guidance, requiring security awareness training. FINRA requires annual training, and HIPAA requires training on policies and procedures.Missing: pretexting | Show results with:pretexting
-
[76]
2025 Verizon DBIR: Why Devaluing Data Stops BreachesMay 27, 2025 · Encouragingly, the report notes that organizations with regular security training saw phishing reporting rates improve fourfold. The Fix: ...
-
[77]
[PDF] VirSec – Immersive Security Training within Virtual RealityOneBonsai's 'Cyber Security Awareness VR' is a cyber awareness training simulator [14] that aims to make players aware of cyber threats within a corporate ( ...Missing: pretexting | Show results with:pretexting
-
[78]
VR/AR-Based Cybersecurity Training: Enhancing Platform Security ...Mar 20, 2025 · Conduct platform-wide security awareness assessment. Identify priority threat vectors for VR/AR treatment. Develop initial concept prototypes.
-
[79]
Integrating Artificial Intelligence into Cybersecurity CurriculumThe integration of Artificial Intelligence (AI) into cybersecurity tools offers significant advantages, enhancing threat detection, predictive analysis, and ...
-
[80]
Avoiding Social Engineering and Phishing Attacks | CISAFeb 1, 2021 · In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer ...Missing: pretexting | Show results with:pretexting
-
[81]
How to Protect Your Organization from a Pretexting Attack | VerizonSep 26, 2025 · To protect against pretexting, train employees, use multi-factor authentication, patch software, install anti-malware, and use AI-powered email ...
-
[82]
7 Tips to Defend Against the Rising Threat of Pretexting - VerusJul 18, 2023 · Zero Trust Security Model: Implement a zero trust security model, where every access request is verified, regardless of where it comes from.
-
[83]
Caller ID Spoofing | Federal Communications CommissionNov 13, 2024 · Caller ID spoofing is when a caller deliberately falsifies the information transmitted to your caller ID display to disguise their identity.
-
[84]
How Can AI Detect Caller ID Spoofing in VoIP and Telecom NetworksAI detects caller ID spoofing by analyzing large volumes of call metadata and signaling information in real time. Machine learning models identify unusual ...
-
[85]
4 Ways to Defend Against Pretexting Scams | Proofpoint USMay 17, 2018 · How to stop pretexting and phishing · Secure email · Train users to be on the lookout for pretexting and phishing scams · Establish a policy to ...
-
[86]
Don't Take the Bait! Phishing and Other Social Engineering AttacksPretexting involves the attacker creating a believable scenario and sharing it to convince the target to provide sensitive data. Attackers that use pretexting ...
-
[87]
[PDF] Cyber Security Planning GuideThey should be educated on computer security best practices and what to do if information is accidentally deleted or cannot easily be found in their files.
-
[88]
You're the weakest link: How to avoid revealing your government's ...How to avoid becoming a victim · Slow down. · Learn how to recognize common phishing email subject lines. · Verify the identity of the person making the request.
-
[89]
What Is Pretexting and How to Avoid It? - McAfeeHere are some strategies to avoid falling victim to pretexting: Educate yourself and others: Awareness is the first line of defense against pretexting.Missing: practices | Show results with:practices
-
[90]
[PDF] Increasing Threat of DeepFake Identities - Homeland SecurityIn this scenario we consider the use of deepfake technology to more convincingly execute social engineering attacks. First, a malign actor would conduct ...
-
[91]
Deepfake threats to companies - KPMG InternationalEnhanced social engineering attacks. By using deepfakes, bad actors can penetrate organizations by, for example, impersonating a Chief Technology Officer ...