• Hithawathi
    • About Us
    • Our supporters
    • Hithawathi TEENS HUB
  • Help Centre

    Caution!

    • COVID-19 Cyber Attacks
    • Cyber security tips
    • Cyber security threats
    • Security Alerts

    Know More

    • Knowledge Base
    • Social Media
    • Parents Guide
    • Children’s Guide
    • How to get help

    Observation

    • Real time cases
    • Videos
    • Newspapers
    • Cyber News & Alerts

  • How to get help
  • News and Events
  • e-Library
    • A Decade of Digital Resilience
    • Monthly Newsletter
    • Cyber Security Booklet
  • Contact
    • FAQ
Are you lost in cyberspace?011-421-6062 help@hithawathi.lk Hithawathi Teens Hub   Cyber security Booklet

 What's right?Donate Now

Please note that Hithawathi services will be limited or delayed on Saturday, the 31st of May 2025 from 8.30am to 12.30pm. Please kindly bear with us. If you are unable to contact us immediately via phone or instant messaging services, please do send us an email to help@hithawathi.lk or a message via Whatsapp / Viber (+94 77 771 1199) or a message via FB Messenger (https://www.facebook.com/hithawathi). We will get back to you as soon as possible.
We value your feedback
  • සිංහල
  • தமிழ்
Hithawathi
  • Hithawathi
    • About Us
    • Our supporters
    • Hithawathi TEENS HUB
  • Help Centre

    Caution!

    • COVID-19 Cyber Attacks
    • Cyber security tips
    • Cyber security threats
    • Security Alerts

    Know More

    • Knowledge Base
    • Social Media
    • Parents Guide
    • Children’s Guide
    • How to get help

    Observation

    • Real time cases
    • Videos
    • Newspapers
    • Cyber News & Alerts

  • How to get help
  • News and Events
  • e-Library
    • A Decade of Digital Resilience
    • Monthly Newsletter
    • Cyber Security Booklet
  • Contact
    • FAQ

Social Engineering

  • Home
  • Help Centre
  • Knowledge Base
  • Social Engineering

Last updated on August 15, 2021

The term Social engineering defines a wide range of malicious activities that involve human interactions, which consist of misleading the innocent tactfully to make mistakes, give out user credentials and the confidential personal information.

In today’s world, social engineering is recognized as a technique that criminals and cyber-crooks use to trick users into exposing confidential information, which is supposed to be kept safely unless that is requested by a relevant app for security purpose or verification.

The ‘social engineers’ (can be used as a professional term for a ‘hacker’) collect those data in order to gain access to various systems and apps (e.g. Facebook, Email, Imo, other social networking modes) making it easier for them to control over till they get the targeted benefit. This benefit can be something earned through blackmailing the users, who are not rational enough.

The following cycle shows how the attacks take place.

Social engineering attack techniques can be identified in five different forms such as;

  1. Baiting

Attackers leave baits often using physical gadgets. For instance, we hear stories like leaving malware-infected flash drives in places where potential victims (may be an employee of this company here) are certain to see them – especially on an office table / bathroom / elevator. The bait is attractive in a way that the bait has an authentic look to it, such as a label presenting it as the company’s ‘payroll list’ or ‘confidential’. These employees may just take the bait and insert the infected device into their company computers. Result of this is an automatic malware installation on the system. Sometimes baiting may take an online form too. For example, pop-up ads or messages carry infected links.
This makes people curious and may end up resulting in automatic malware installation on the system / computer.

  1. Scareware

Scareware approaches victims, making them scared of something that is not real. For instance, you may get a message like

Warning – Your computer may be infected with harmful spyware programs

offering you to install a tool they recommend (most of the time, a malicious link)

  1. Pretexting

The attacker cleverly drafts lies pretending they have the authority to get your personal information such as phone numbers, bank account numbers, and Passport details. The words may come to you with the perfect logos, letterheads of the important officials to trick you.

  1. Phishing

Scams attempting to take user credentials to hack your accounts and consequently blackmail, can be categorized as phishing.Find more information of how to identify which link is fake or real.

  1. Spear phishing

Spear phishing targets individuals skillfully. Social engineers spend more time and effort required to get someone caught as it is carefully aimed to the point, until the individuals believe that it is true and cannot escape responding. For example, hackers secretly attempt to convince people of lottery winnings or other unexpected price scams through emails asking for your personal information, which can be even used to do identity theft.Get to know about today’s top trending types of scams

Social engineering prevention

To prevent social engineers’ attacks, which manipulate human feelings; you should be on alert and think wisely before you react to anything on cyberspace.

Here are some tips to be secure from social engineering hacks;

  • Do not open strange looking attachments or anything that contain enthusiastic links unless you make sure that the URL is correct. (Find out how to identify which link is fake or real)
  • Use two-step authentication, which is a security process that uses two different authentication factors to verify the user. (Learn Two-step Authentication here)
  • Never give your passwords or login credentials to anyone.
  • Be wary of tempting offers, since they pave the way to lose even what you have.
  • Install an up-to-date anti-virus / antimalware software

Learn more about Your Safety in Cyber Space.

References:

https://www.imperva.com/learn/application-security/social-engineering-attack/
https://www.pandasecurity.com/mediacenter/security/social-engineering/

  • Special Warning
  • Defense Against COVID-19 Cyber Threats
  • How to be safe during this disasters situation
  • How to save your child from cyber crimes
  • Covid-19 Cyber Threats
  • What you should do?
  • How to report to Hithawathi
  • Tell IGP
  • Child Hotline
  • Useful Contact Information
  • Identify, prevent Internet Theft
  • Cybersafety Tips 1
  • Cyber Safety Tips 2
  • Password Part 1 – Selecting a strong password and protecting it
  • Your Safety in Cyber Space
  • What is Two-Factor Authentication?
  • Internet Safety Tips for Children and Teens
  • Spam vs. Scam
  • Work From Home Tips
  • Password Part 2 – How to remember difficult passwords in an easy way
  • Cyber Security Threats in 2020 – 01 – Deepfake
  • Cyber Security Threats in 2020 – 02 – 5G
  • Special Warning
  • Receiving OTP (One Time Password) via a Local Private Number
  • Google Patches High-Severity Flaws in Google Chrome
  • Cyber Security Alert
  • Apple Release Urgent Patches for two Zero-Day Flaws
  • Identify Computer Virus
  • Is Internet good or bad?
  • Internet Frauds
  • Safety on Your Email
  • How to secure your email account?
  • Why can’t I receive or send an e-mail?
  • You Decide whether it is a Fake or a Real Weblink/URL!
  • How to tell if an e-mail is a scam
  • What are scams
  • Social Engineering
  • Report a video
  • Report a thumbnail
  • Report a comment
  • Report a live chat message
  • Report a channel
  • How to change the number on WhatsApp account?
  • How to delete the WhatsApp account?
  • How to block WhatsApp contacts?
  • How to configure privacy settings on WhatsApp?
  • How to configure security settings on WhatsApp?
  • WhatsApp Hacking
  • How to secure your WhatsApp account from social hacking
  • Reporting on WhatsApp
  • How to configure two-step verification settings on WhatsApp?
  • WhatsApp group settings
  • How you can protect your privacy while using Viber?
  • How to back up your Viber chats?
  • How to deactivate a Viber account?
  • Reporting on Viber
  • Admin Controls in Viber Groups
  • Imo
  • How to delete an IMO account?
  • How to Block an IMO chat?
  • How do you report a fake account (impersonating you / pretending to be you) on Instagram?
  • How do you report a post or profile for abuse or spam on Instagram?
  • Do you think your Instagram account has been hacked?
  • How do you report a hacked account on LinkedIn?
  • How do you report inaccurate information on another member’s profile on LinkedIn?
  • How do you report a fake profile on LinkedIn?
  • How do you file a report when a Tweet is abusive
  • How do you report an impersonation violation (fake account) on X (Twitter)?
  • Is your X (Twitter) account hacked?
  • How to report Inappropriate Content on TikTok?
  • If your TikTok account is hacked
  • How to report fake / impersonating accounts on TikTok?
  • Privacy and Safety
  • Reporting

  • Login and Password
  • Your Profile and Settings
  • Names on Facebook

  • What names are allowed on Facebook?
  • Which name should I use on Facebook?
  • How do I add or edit a language-specific name?
  • What if I have one name instead of a first name and a last name?
  • Changing your name or adding additional names

  • Keeping Your Account Secure
  • Notifications
  • Ad Preferences
  • Accessing & Downloading Your Information
  • Deactivating or Deleting Your Account

  • I deactivated my account. How do I reactivate it?
  • How do I permanently delete my Facebook account?
  • Can I remove the account of a friend or family member who’s medically incapacitated?

  • Reporting Abuse

  • Reporting a Privacy Violation
  • Hacked and Fake Accounts

  • Hacked Accounts

  • You think your account was hacked or someone is using it without your permission.
  • You think your friend’s account was hacked.

  • Impersonation Accounts

  • How do you report an account for impersonation?
  • How do you report an account or Page that’s pretending to be you or someone else?
  • How do you request information about a timeline that was impersonating you?

  • Fake Accounts

  • Managing a Deceased Person’s Account
  • Uploading Your ID
  • Intellectual Property

  • Overview

  • What types of things aren’t allowed on Facebook?
  • What types of behavior does Facebook identify as abusive?
  • Does Facebook allow photos of mothers breastfeeding?
  • Does Facebook allow post-mastectomy photos?
  • Why does Facebook limit the use of certain features and what are the limits?
  • Does Facebook consult with any external groups to inform its policies?
  • Are firearm sales allowed on Facebook?
  • Account Info
  • Can I create a joint Facebook account or share a Facebook account with someone else?

  • Your Privacy
  • Staying Safe
  • Keeping Your Account Secure
  • Unfriending or Blocking Someone

  • Unfriend
  • Block

  • What is blocking and how do you block someone?
  • After you block someone, can you see anything about that person?
  • How do you block someone from following you?
  • How do you block messages from someone on Facebook?
  • What is unblocking and how do you unblock someone?

  • Take a Break

  • How do you take a break from someone on Facebook?
  • Can you limit who can see your past posts?
  • Your romantic relationship ended. What can you do?
  • Who can see when you change your relationship status?
  • How can you stop someone from contacting you?

  • Hacked and Fake Accounts

  • Hacked Accounts

  • You think your account was hacked or someone is using it without your permission.
  • You think your friend’s account was hacked.

  • Impersonation Accounts

  • How do you report an account for impersonation?
  • How do you report an account or Page that’s pretending to be you or someone else?
  • How do you request information about a timeline that was impersonating you?

  • Fake Accounts

  • Inheritance scams
  • Rebate scams
  • Nigerian scams
  • Unexpected prize and lottery scams
  • Travel prize scams
  • Classifieds scams
  • Overpayment scams
  • Health & medical products
  • False billing
  • Online shopping scams
  • Psychic & clairvoyant
  • Mobile premium services
  • Investment scams
  • Betting and sports investment scams
  • Jobs and employment scams
  • Pyramid schemes
  • Identity theft
  • Phishing
  • Hacking
  • Remote access scams
  • Malware & ransomware
  • Threats to life, arrest or other

Hithawathi

A Project Powered by
Foundation.LK

       Instagram 

Useful Links

Sri Lanka Police
Sri Lanka Computer Emergency Readiness Team
The Bureau for the Prevention of Abuse of Children and Women
Child Helpline – National Child Protection Authority
Women Helpline – Ministry of Women & Child Affairs
Special Mental Health Hotline
TechCERT

Contact Us

Phone: 011-421-6062
Email: help@hithawathi.lk
WhatsApp / Viber: +94 77 771 1199
BUSINESS HOURS

Weekdays 08.30 am – 05.00 pm
Saturdays 08.30 am – 12.30 pm
Closed on Public holidays.

(Calls may be recorded for training and quality purposes)

Copyright © 2025 Hithawathi. All Rights Reserved.

Terms and Conditions | Privacy Policy

Donate Now

Become a partner ?
Just call us 011-421-6062