Matching Pairs Social Engineering Online version Social Engineering Techniques by Kathy San 1 Dumpster Diving 2 Vishing 3 Eliciting information 4 Tailgating 5 Spam 6 Pharming 7 Whaling 8 Shoulder Surfing 9 Phishing 10 Spear Phishing 11 SPIM 12 Smishing Attackers who gain useful information searching through trash. An email attack targeting specific individual or group. A technique that is used to discreetly gather information. Usually, a casual conversation to extract information. An attack using text messages. Attacker spying over your shoulder watching to steal personal information. A phishing attack that targets high-ranking officials such as a CEO or other top-level executives. Attacker who uses phone calls or leaving voice messages defrauding to gain sensitive information over the phone. Spam messages sent through instant messages like WhatsApp, Skype, or other chatting platforms. A technique that involves following someone into a secure area. Unwanted junk email sent out in bulk. A website attack technique that hackers use to redirect users from a legitimate site to a fake site. Target emails. Usually spam with typo errors and requesting users to click on a malicious link.