Glossary

What is Social Engineering?

Social engineering is a class of attack techniques that manipulate human psychology — trust, fear, urgency, or helpfulness — to trick people into divulging confidential information, granting unauthorized access, or performing actions that compromise security.

Also known as: social engineering attack, pretexting

Social engineering attacks target the weakest link in any security system: people. Common techniques include pretexting (fabricating a scenario to gain trust), baiting (offering something enticing like a USB drive), tailgating (following someone through a secure door), and phishing (deceptive messages). These attacks bypass firewalls, encryption, and access controls by exploiting the humans who operate them.

The most dangerous social engineering attacks are multi-stage. An attacker might first gather information from social media and public sources, then use that context to call an IT helpdesk and convince them to reset a password. Or they impersonate a new employee to get a colleague to share Wi-Fi credentials or system access. The attack surface expands dramatically in organizations where sensitive information is routinely shared through insecure channels.

Technical controls can reduce — but not eliminate — social engineering risk. Strict verification procedures, least-privilege access policies, and security awareness programs all help. Critically, minimizing the amount of sensitive data that exists in persistent, readable form (emails, chat logs, shared documents) limits what a social engineer can extract even when they successfully deceive a target.

How Vaulted uses Social Engineering

Vaulted limits the blast radius of social engineering attacks against secret sharing workflows. Because Vaulted links self-destruct after a configured number of views and the server stores only ciphertext with no ability to decrypt it (zero-knowledge architecture), a social engineer who gains access to a communication channel finds only expired links or undecryptable data. The encryption key in the URL fragment and optional passphrase protection add further barriers that social engineering alone cannot bypass.