Phishing & Social Engineering
Glossary entries about impersonation, manipulation, and message-based scams that pressure people into clicking, paying, or sharing data.
What this category covers
This category covers attacks that target people first. Instead of defeating a security tool directly, the attacker creates a believable reason for someone to take the wrong action.
It helps business teams explain why trust, urgency, routine behavior, and informal mobile communication still create risk even when strong technical controls are in place.
Published glossary pages
Start with the glossary entries that are already live in this category.
- Angler Phishing
- Attachment-Based Phishing
- Baiting
- Business Email Compromise
- Calendar Phishing
- Callback Phishing
- Catfishing
- Clone Phishing
- Display Name Spoofing
- Domain Spoofing
- Email Spoofing
- Evil Twin Phishing
- Impersonation Attack
- Link Obfuscation
- Phishing Email
- Pig Butchering
- Pretexting
- Quishing
- Scambaiting
- Shoulder Surfing
- Smishing
- Social Engineering
- Spear Phishing
- Tailgating (Physical Security)
- Tech Support Scams
- Vishing
- Whaling (Executive Phishing)
Planned glossary terms
These terms are already mapped to this category so new pages can be added without changing the structure.
Browse the full glossary
Use the glossary index to jump across categories and follow the live entries as the section expands.