What is Social Engineering?
Social engineering is a class of attack techniques that manipulate human psychology — trust, fear, urgency, or helpfulness — to trick people into divulging confidential information, granting unauthorized access, or performing actions that compromise security.
Also known as: social engineering attack, pretexting
Social engineering attacks target the weakest link in any security system: people. Common techniques include pretexting (fabricating a scenario to gain trust), baiting (offering something enticing like a USB drive), tailgating (following someone through a secure door), and phishing (deceptive messages). These attacks bypass firewalls, encryption, and access controls by exploiting the humans who operate them.
The most dangerous social engineering attacks are multi-stage. An attacker might first gather information from social media and public sources, then use that context to call an IT helpdesk and convince them to reset a password. Or they impersonate a new employee to get a colleague to share Wi-Fi credentials or system access. The attack surface expands dramatically in organizations where sensitive information is routinely shared through insecure channels.
Technical controls can reduce — but not eliminate — social engineering risk. Strict verification procedures, least-privilege access policies, and security awareness programs all help. Critically, minimizing the amount of sensitive data that exists in persistent, readable form (emails, chat logs, shared documents) limits what a social engineer can extract even when they successfully deceive a target.
How Vaulted uses Social Engineering
Vaulted limits the blast radius of social engineering attacks against secret sharing workflows. Because Vaulted links self-destruct after a configured number of views and the server stores only ciphertext with no ability to decrypt it (zero-knowledge architecture), a social engineer who gains access to a communication channel finds only expired links or undecryptable data. The encryption key in the URL fragment and optional passphrase protection add further barriers that social engineering alone cannot bypass.