Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

5.2.3. Social Engineering and Malware

Social Engineering Attacks:
AttackDescription
PhishingFraudulent emails/messages tricking users into revealing credentials
VishingVoice phishing (phone calls)
SmishingSMS phishing
Spear phishingTargeted phishing at specific individuals
WhalingPhishing targeting executives
Shoulder surfingVisual observation of credentials/screens
TailgatingFollowing authorized person through secured door
Dumpster divingSearching trash for sensitive information

⚠️ Exam Trap: Shoulder surfing is visual observation—watching someone type a password or viewing their screen. It's low-tech social engineering, not a network attack.

Malware Types: Viruses (require host program), worms (self-propagating), ransomware (encrypts data for ransom), trojans (disguised as legitimate), spyware (covert surveillance).

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications