You鈥檙e only human. And criminals called social engineers, or 鈥渉uman hackers鈥, are out to manipulate you into revealing sensitive information or into downloading software that will compromise your computer鈥檚 security. Social engineering attacks can happen online, in-person, or through other interactions. How do they do it? They often impersonate legitimate organizations to gain trust, then play on your emotions鈥攕uch as fear (鈥榊our grandson is in jail鈥), greed (鈥淵ou鈥檝e just won a million dollars!鈥), or sympathy (鈥淚鈥檓 bankrupt due to medical bills鈥攑lease wire money now!鈥) that will entice you to divulge your personal and financial data or click on a link that takes control of your computer system.
These fraudsters are smart and unrelenting. And incidents are skyrocketing. Research from 2024 shows hundreds of millions of threats come from information stealers, Trojans (that lure you to install malicious software, or malware), and ransomware (where your computer鈥檚 files are encrypted and the criminals demand a ransom payment to decrypt them).听There are ways to outsmart them, but you first need to be aware of exactly how they operate.
The most common social engineering attacks that aim to deceive you:
Phishing: The cyberthief creates a sense of urgency (鈥24 hours before unclaimed funds expire!鈥) or appeals to your curiosity with a leading question (鈥淎re you owed compensation?鈥) via emails, texts - 听called smishing, or phone calls. If you engage by giving personal information or click on an embedded link, they can gain access to your computer and 听bank accounts, credit cards, etc. 听government agencies, financial institutions, or popular social media applications or file sharing sites 鈥 to gain confidence and encourage you to follow the email鈥檚 directives, such as divulging sensitive information. These phishing attacks prey on curiosity, greed, great deals, and emotion
1.听Baiting: Through emotional lures similar to phishing, they 鈥渂ait鈥 you into installing or clicking on something that ends up putting malware onto your computer system. Offers for gift cards, free smartphones, or even a share of a lottery winner鈥檚 profits 鈥 are popular baiting techniques.
2.听Quid pro quo: Here, a criminal offers a seemingly desirable product or service in exchange for access to confidential information (鈥淗ere鈥檚 new software to make your computer run faster!鈥 or 鈥淲e think you鈥檇 be a perfect candidate for this job!鈥).
3.听Pretexting involves bad actors impersonating someone you trust鈥攜our boss, a police officer, government official鈥攕o you feel obliged to respond and follow their directions to provide sensitive information; once you comply, they can access your financial accounts.
4.听听Scareware, like the name implies, frightens you with scary pop-ups and notifications (鈥淲arning! Your computer may be infected!鈥), leading you to install malware that gives them access to your data. Examples can include pops up such as

Fraud in motion: Learn the ways fraudsters try to access your information. It鈥檚 more than you think.
Even the most sophisticated computer users can be vulnerable to social engineering scams. The more aware you are of how scam artists work, the less likely you are to become a victim.

How to protect yourself
It can be intimidating to know that there are people who look to misuse your financial data. Just follow these guidelines to guard your personal information.
Security checklist
- Verify all requests for information from a source that鈥檚 unfamiliar or even if the name is familiar but something looks 鈥渙ff鈥濃攑erhaps when you check the sender鈥檚 origin, it鈥檚 a personal or odd email address; or maybe the message has misspellings and grammar errors. Delete the email without responding and contact the actual company directly to report the message.
- Be password savvy. Make it a hard-to-guess mix of uppercase and lowercase letters, numbers, and symbols at least 12 characters long. Save the details in a password manager software 鈥渧ault鈥 application, enable multifactor authentication (MFA) on your accounts so you need a password and a one-time code, use different passwords across accounts, and never share your login credentials.
- Regularly update your operating system and antivirus software to ensure you have the latest security features (SPAM filter and a personal firewall), and check your online accounts for any unauthorized activity.
- Think before you click on embedded hyperlinks in emails or texts that look suspicious. Enter the URL into the address bar to see if it takes you to a reliable source. Still not sure? Call the supposed company sender to check its authenticity.
- Stick to private Wi-Fi online activity and don鈥檛 perform your banking, credit card, or other financial activities in a public place.听
In such a fast-paced world, it鈥檚 tempting to quickly rush in and select a link or respond to an email that engages your attention. Armed with the information provided above, however, you will be far less likely to get caught in a fraudster鈥檚 trap and unwittingly reveal your valuable personal and financial information.听
Have you been targetedby online fraudsters? Do the following:
- Contact M&T 萌妹社区 immediately to investigate and help secure your account
- Immediately change the passwords on any accounts where you entered information in response to the social engineering incident.听
- Freeze your credit or set a fraud alert with credit bureaus (Equifax, Experian, TransUnion).
- Monitor your financial accounts and contact your bank or card issuer right away if you notice any suspicious activity.听