
Smishing is a form of social engineering that exploits SMS, or text, messages. Landline communication cannot be intercepted without physical access to the line however, this trait is not beneficial when communicating directly with a malicious actor. VoIP easily allows caller identity (ID) to be spoofed, which can take advantage of the public’s misplaced trust in the security of phone services, especially landline services. Advanced vishing attacks can take place completely over voice communications by exploiting Voice over Internet Protocol (VoIP) solutions and broadcasting services. This technique can be combined with other forms of social engineering that entice a victim to call a certain number and divulge sensitive information. Vishing is the social engineering approach that leverages voice communication.

Epidemics and health scares (e.g., H1N1, COVID-19).Natural disasters (e.g., Hurricane Katrina, Indonesian tsunami).Attackers often take advantage of current events and certain times of the year, such as Phishing attacks may also appear to come from other types of organizations, such as charities. When users respond with the requested information, attackers can use it to gain access to the accounts. For example, an attacker may send email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. Phishing is a form of social engineering. If an attacker is not able to gather enough information from one source, he or she may contact another source within the same organization and rely on the information from the first source to add to his or her credibility. However, by asking questions, he or she may be able to piece together enough information to infiltrate an organization's network. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems.
