{"componentChunkName":"component---src-templates-dictionary-term-tsx","path":"/dictionary/pretexting","result":{"data":{"contentfulDictionaryTerm":{"title":"Pretexting","slug":"pretexting","descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":"Explore pretexting, a deceptive social engineering tactic where scammers impersonate trusted figures to steal your information. Learn to spot these scams and protect yourself from their damaging effects."}},"body":{"body":"# Pretexting: What it really means\nPretexting is a form of [social engineering](https://guard.io/dictionary/social-engineering \"Guardio Dictionary - What's social engineering?\") where scammers disguise themselves as familiar figures, like a bank teller or a relative in need, to gain your trust and access your personal information. Their goal is to manipulate you into surrendering valuable data or money through convincing communications.\n\nScams like the Nigerian prince, tech support, and \"Hey Mom, It’s Me\" all employ pretexting. This technique involves the scammer contacting you under a false identity and for a specific, often urgent reason. Scammers use this method as their go-to strategy, crafting stories and scenarios to deceive people into giving up keys to their digital fortress. While these scenarios might seem as if they belong in a sitcom, the repercussions of being duped by them are seriously damaging.\n\n#### Why it matters:\n- [98% of cyber attacks](https://firewalltimes.com/social-engineering-statistics/ \"Fire Wall Times - 30 Social Engineering Statistics – 2023\") involve social engineering, with half using pretexting.\n\n- Pretexting targets individuals and companies alike, and leads to significant financial and data loss.\n\n## What's the difference: Pretexting vs. phishing?\nPretexting is a specific type of phishing. It's highly targeted, using detailed stories to gain trust and access to data, different from broader phishing tactics that cast a wide net.\n\n## How pretexting scams work:\nScammers research you, then reach out, pretending to be someone you know needing urgent help. It's a sophisticated ruse to get your money or data, often leading to stolen identities and financial ruin. Here's how it would play out:\n\n__Initial research:__ Scammers comb through social media, public records, and breaches to gather your data.\n\n__Crafted approach:__ They reach out with customized messages that sound like they're from someone you trust, based on your digital footprint.\n\n- Believable twist: The scam gains credibility if they use actual contact information of the person they're pretending to be (the person contacting you). They can do this by stealing the person's [SIM](https://guard.io/blog/how-to-detect-phone-cloning \"Guardio Blog - Has your phone been cloned?\") or [hijacking their social media](https://guard.io/blog/facebook-hijacking-recognize-react-and-guard-io \"Guardio Blog - Facebook Hijacking: Recognize, React, and Guard(io)\") account.\n\n__Urgent plea:__ A convincing call for help arrives, designed to provoke an immediate response.\n\n__Pressure mounts:__ The insistence on quick action aims to cloud your decision-making.\n\n__Game over:__ Responding with aid or information seals the scam, leaving you financially and emotionally drained.\n\n__The consequences:__ With the scammer gone, you face the aftermath of financial loss, identity theft, and a daunting recovery.\n\n#### Guard against pretexting\n[Guardio](https://guard.io/plans \"Guardio Plans page\") offers a defense, blocking suspicious activities and alerting you to potential scams. It’s about adding a layer of protection to your digital life.\n\n![Pretexting graphic image](//images.ctfassets.net/tdnn4v0n6ild/4H9G0PkZHxnKH1TSpaP1ev/b58ed3c4a16194126a6425d606935196/Pretexting_-min.jpg)\n\n## Types of Pretexting:\n\n__Phishing on steroids:__ Emails pretending to be from trusted sources asking for sensitive actions.\n\n__Smishing & vishing:__ Calls or texts impersonating authorities to get personal info.\n\n__Scareware:__ Pop-ups falsely warn your device is at risk, offering downloads that are actually malware.\n\n__Impersonation:__ Scammers fake identities, like friends or bank staff, to deceive you. SIM swap scams are one method, redirecting your security alerts to them.\n\n- The Ubiquiti Networks Breach, in 2015 is a prime example: A major scam involving attackers impersonating execs to steal [$46.7 million](https://www.nbcnews.com/tech/security/ubiquiti-networks-says-it-was-victim-47-million-cyber-scam-n406201 \"NBC News - Ubiquiti Networks Says It Was Victim of $47 Million Cyber Scam\") highlights the severe impact of impersonation.\n\n__Tailgating and Piggybacking:__ Attackers sneak into secure areas by following authorized personnel or exploiting their trust, a tactic combining stealth with social engineering.\n\n__Baiting:__ Scammers use tempting offers, like malware-laden USBs disguised as legitimate, to trick victims into compromising their devices.\n\nBaiting extends beyond physical items to digital lures, such as enticing online ads or download offers, leading to malware infections or data theft.\n\n#### Staying Safe\nWith Guardio, protect yourself from pretexting and other scams. It stops phishing attempts, secures your accounts, and keeps you informed about potential breaches.\n\n#### Why Guardio?\nGuardio is your ally in the digital age, offering tools and alerts to keep scammers at bay. Try it out with a [7-day free trial](https://guard.io/plans \"Guardio Plans page\") and see how it fortifies your online security.\n\nIn summary, pretexting is a scammer's narrative tool, but with knowledge and [Guardio’s comprehensive protection](https://guard.io/plans \"Guardio Plans page\"), you can secure your digital realm.\n","childMarkdownRemark":{"htmlAst":{"type":"root","children":[{"type":"element","tagName":"h1","properties":{"id":"pretexting-what-it-really-means","style":"position:relative;"},"children":[{"type":"text","value":"Pretexting: What it really means"},{"type":"element","tagName":"a","properties":{"href":"#pretexting-what-it-really-means","ariaLabel":"pretexting what it really means permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Pretexting is a form of "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/dictionary/social-engineering","title":"Guardio Dictionary - What's social engineering?"},"children":[{"type":"text","value":"social engineering"}]},{"type":"text","value":" where scammers disguise themselves as familiar figures, like a bank teller or a relative in need, to gain your trust and access your personal information. Their goal is to manipulate you into surrendering valuable data or money through convincing communications."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Scams like the Nigerian prince, tech support, and \"Hey Mom, It’s Me\" all employ pretexting. This technique involves the scammer contacting you under a false identity and for a specific, often urgent reason. Scammers use this method as their go-to strategy, crafting stories and scenarios to deceive people into giving up keys to their digital fortress. While these scenarios might seem as if they belong in a sitcom, the repercussions of being duped by them are seriously damaging."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h4","properties":{"id":"why-it-matters","style":"position:relative;"},"children":[{"type":"text","value":"Why it matters:"},{"type":"element","tagName":"a","properties":{"href":"#why-it-matters","ariaLabel":"why it matters permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"a","properties":{"href":"https://firewalltimes.com/social-engineering-statistics/","title":"Fire Wall Times - 30 Social Engineering Statistics – 2023"},"children":[{"type":"text","value":"98% of cyber attacks"}]},{"type":"text","value":" involve social engineering, with half using pretexting."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Pretexting targets individuals and companies alike, and leads to significant financial and data loss."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h2","properties":{"id":"whats-the-difference-pretexting-vs-phishing","style":"position:relative;"},"children":[{"type":"text","value":"What's the difference: Pretexting vs. phishing?"},{"type":"element","tagName":"a","properties":{"href":"#whats-the-difference-pretexting-vs-phishing","ariaLabel":"whats the difference pretexting vs phishing permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Pretexting is a specific type of phishing. It's highly targeted, using detailed stories to gain trust and access to data, different from broader phishing tactics that cast a wide net."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h2","properties":{"id":"how-pretexting-scams-work","style":"position:relative;"},"children":[{"type":"text","value":"How pretexting scams work:"},{"type":"element","tagName":"a","properties":{"href":"#how-pretexting-scams-work","ariaLabel":"how pretexting scams work permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Scammers research you, then reach out, pretending to be someone you know needing urgent help. It's a sophisticated ruse to get your money or data, often leading to stolen identities and financial ruin. Here's how it would play out:"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Initial research:"}]},{"type":"text","value":" Scammers comb through social media, public records, and breaches to gather your data."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Crafted approach:"}]},{"type":"text","value":" They reach out with customized messages that sound like they're from someone you trust, based on your digital footprint."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"Believable twist: The scam gains credibility if they use actual contact information of the person they're pretending to be (the person contacting you). They can do this by stealing the person's "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/blog/how-to-detect-phone-cloning","title":"Guardio Blog - Has your phone been cloned?"},"children":[{"type":"text","value":"SIM"}]},{"type":"text","value":" or "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/blog/facebook-hijacking-recognize-react-and-guard-io","title":"Guardio Blog - Facebook Hijacking: Recognize, React, and Guard(io)"},"children":[{"type":"text","value":"hijacking their social media"}]},{"type":"text","value":" account."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Urgent plea:"}]},{"type":"text","value":" A convincing call for help arrives, designed to provoke an immediate response."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Pressure mounts:"}]},{"type":"text","value":" The insistence on quick action aims to cloud your decision-making."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Game over:"}]},{"type":"text","value":" Responding with aid or information seals the scam, leaving you financially and emotionally drained."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"The consequences:"}]},{"type":"text","value":" With the scammer gone, you face the aftermath of financial loss, identity theft, and a daunting recovery."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h4","properties":{"id":"guard-against-pretexting","style":"position:relative;"},"children":[{"type":"text","value":"Guard against pretexting"},{"type":"element","tagName":"a","properties":{"href":"#guard-against-pretexting","ariaLabel":"guard against pretexting permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page"},"children":[{"type":"text","value":"Guardio"}]},{"type":"text","value":" offers a defense, blocking suspicious activities and alerting you to potential scams. It’s about adding a layer of protection to your digital life."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-wrapper"],"style":"position: relative; display: block; ; max-width: 900px; margin-left: auto; margin-right: auto;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-background-image"],"style":"padding-bottom: 100%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAMCAgMCAgMDAwMEAwMEBQgFBQQEBQoHBwYIDAoMDAsKCwsNDhIQDQ4RDgsLEBYQERMUFRUVDA8XGBYUGBIUFRT/2wBDAQMEBAUEBQkFBQkUDQsNFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBT/wAARCAAoACgDAREAAhEBAxEB/8QAGgAAAgMBAQAAAAAAAAAAAAAAAAQDBQcGCf/EACkQAAEDAgUDAwUAAAAAAAAAAAECAwQAEQUSEyExBhRRQWGxIjNUcYH/xAAaAQEAAgMBAAAAAAAAAAAAAAAAAwYBAgQF/8QAKxEAAQQBAQUHBQAAAAAAAAAAAQACAxEEEgUTITFBBiJRYXGBoTJCkbHB/9oADAMBAAIRAxEAPwD1ToioMU65wbB5bsaTKyuM21SlJUG7i4CiOL1FvQX7sAk+QJ/JAoKURuLdX9TMLqfDsRjJkRpTDzCl6YWl1O6vFr8+3NdTonsNOaVDYurT7U6O87pofbU7YqyBQzWBsdv3UNi6W1GrU9ZWEURYd1rHhzeocYbbiRNRx4EvvpJcbUi2a1iNlVUJe0uRs3NfjxxlzLFi+dgA14e/Ve/Fs9k8DZHOo0l0MMvOrxN9Eduat1LioDScrKdsoNh67ZufmrzmbRh2dgSFhrS2yPu4ngOHieHgqfDvsjaTWaO6e7q9OPP06Lr+gEjGMVbkLlAOw2/p0kgF5JJFleAD6e44qoYM0efPvHE72LhfIFrgDxHkfkX1VnyWOx49Lfpd8ELSqsq8lFEVN1DhjUnDpl2gSW1LStKMykrA2PxU0LzG8FcuTjtyY9DlhsFU4YjHU087ZwtoUFXUTvbgg3G/HtV0lhxQHSgDVX65LhfiRyN0VQ96BPWlv2HwGoiUhpoNoSnKnaxPqSf7VIc4vJcV6UMTYYxG3kE7WimRREtiKJbkVSYTzTEi4yrebK0gXF7gEci45rIrqiptDqv8zB9jfaM7uPH3Kz3UV3C7jtGe70+6yDV0b5M1t8t97X81qfJFPREURFERREURFEX/2Q=='); background-size: cover; display: block;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"img","properties":{"className":["gatsby-resp-image-image"],"style":"width: 100%; height: 100%; margin: 0; vertical-align: middle; position: absolute; top: 0; left: 0; box-shadow: inset 0px 0px 0px 400px white;","alt":"Pretexting graphic image","title":"","src":"https://images.ctfassets.net/tdnn4v0n6ild/4H9G0PkZHxnKH1TSpaP1ev/b58ed3c4a16194126a6425d606935196/Pretexting_-min.jpg","srcSet":["https://images.ctfassets.net/tdnn4v0n6ild/4H9G0PkZHxnKH1TSpaP1ev/b58ed3c4a16194126a6425d606935196/Pretexting_-min.jpg?w=613 613w","https://images.ctfassets.net/tdnn4v0n6ild/4H9G0PkZHxnKH1TSpaP1ev/b58ed3c4a16194126a6425d606935196/Pretexting_-min.jpg?w=1225 1225w","https://images.ctfassets.net/tdnn4v0n6ild/4H9G0PkZHxnKH1TSpaP1ev/b58ed3c4a16194126a6425d606935196/Pretexting_-min.jpg?w=2450 2450w"],"sizes":"(max-width: 900px) 100vw, 900px","loading":"lazy"},"children":[]},{"type":"text","value":"\n "}]},{"type":"text","value":"\n "}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h2","properties":{"id":"types-of-pretexting","style":"position:relative;"},"children":[{"type":"text","value":"Types of Pretexting:"},{"type":"element","tagName":"a","properties":{"href":"#types-of-pretexting","ariaLabel":"types of pretexting permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Phishing on steroids:"}]},{"type":"text","value":" Emails pretending to be from trusted sources asking for sensitive actions."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Smishing & vishing:"}]},{"type":"text","value":" Calls or texts impersonating authorities to get personal info."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Scareware:"}]},{"type":"text","value":" Pop-ups falsely warn your device is at risk, offering downloads that are actually malware."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Impersonation:"}]},{"type":"text","value":" Scammers fake identities, like friends or bank staff, to deceive you. SIM swap scams are one method, redirecting your security alerts to them."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"The Ubiquiti Networks Breach, in 2015 is a prime example: A major scam involving attackers impersonating execs to steal "},{"type":"element","tagName":"a","properties":{"href":"https://www.nbcnews.com/tech/security/ubiquiti-networks-says-it-was-victim-47-million-cyber-scam-n406201","title":"NBC News - Ubiquiti Networks Says It Was Victim of $47 Million Cyber Scam"},"children":[{"type":"text","value":"$46.7 million"}]},{"type":"text","value":" highlights the severe impact of impersonation."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Tailgating and Piggybacking:"}]},{"type":"text","value":" Attackers sneak into secure areas by following authorized personnel or exploiting their trust, a tactic combining stealth with social engineering."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Baiting:"}]},{"type":"text","value":" Scammers use tempting offers, like malware-laden USBs disguised as legitimate, to trick victims into compromising their devices."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Baiting extends beyond physical items to digital lures, such as enticing online ads or download offers, leading to malware infections or data theft."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h4","properties":{"id":"staying-safe","style":"position:relative;"},"children":[{"type":"text","value":"Staying Safe"},{"type":"element","tagName":"a","properties":{"href":"#staying-safe","ariaLabel":"staying safe permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"With Guardio, protect yourself from pretexting and other scams. It stops phishing attempts, secures your accounts, and keeps you informed about potential breaches."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h4","properties":{"id":"why-guardio","style":"position:relative;"},"children":[{"type":"text","value":"Why Guardio?"},{"type":"element","tagName":"a","properties":{"href":"#why-guardio","ariaLabel":"why guardio permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Guardio is your ally in the digital age, offering tools and alerts to keep scammers at bay. Try it out with a "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page"},"children":[{"type":"text","value":"7-day free trial"}]},{"type":"text","value":" and see how it fortifies your online security."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"In summary, pretexting is a scammer's narrative tool, but with knowledge and "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page"},"children":[{"type":"text","value":"Guardio’s comprehensive protection"}]},{"type":"text","value":", you can secure your digital realm."}]}],"data":{"quirksMode":false}}}}}},"pageContext":{"title":"Pretexting","slug":"pretexting","keepLearning":[{"title":"Push Notifications (web","slug":"push-notifications-web"},{"title":"Quarantining","slug":"quarantining"}],"breadcrumb":{"location":"/dictionary/pretexting","crumbs":[{"pathname":"/","crumbLabel":"Homepage"},{"pathname":"/dictionary","crumbLabel":"dictionary"},{"pathname":"/dictionary/pretexting","crumbLabel":"pretexting"}]}}},"staticQueryHashes":["1614255152"]}