{"id":7288,"date":"2015-08-05T07:19:07","date_gmt":"2015-08-04T23:19:07","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=1137"},"modified":"2015-08-05T07:19:07","modified_gmt":"2015-08-04T23:19:07","slug":"definition-of-the-day-pretexting","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/definition-of-the-day-pretexting\/","title":{"rendered":"Definition of the Day: Pretexting"},"content":{"rendered":"

Pretexting is a sibling of phishing and like siblings both have differences as well as similarities. Phishing emails use fear and urgency to drive users to take actions that compromise their system. Pretexting is much more positive \u2013 it centers around the hacker building a false sense of trust with the victim. <\/p>\n

The most prevalent pretexting scenario is when an attacker poses as an IT person who sends an email — or a voicemail or robo-call directing targets to visit a certain website and enter information to confirm their identity. <\/p>\n

Another deeper example of pretexting is an attacker who poses as external IT consultants \u2013 perhaps a security auditor \u2013 who then manipulates the company\u2019s security staff to let him\/her into the building or datacenter. Another would be someone posing as a pizza delivery person who needs access to the office building to deliver a pizza to ‘the guys up in network ops…’ <\/p>\n

Where phishing relies mainly on urgency and fear, pretexting lives and dies by how well the attacker creates credibility with his\/her story. <\/p>\n","protected":false},"excerpt":{"rendered":"

Pretexting is a sibling of phishing and like siblings both have differences as well as similarities. Phishing emails use fear and urgency to drive users to take actions that compromise their system. Pretexting is much more positive \u2013 it centers around the hacker building a false sense of trust with the victim. The most prevalent […]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[346,349],"tags":[55,263,82,50,354,164],"class_list":["post-7288","post","type-post","status-publish","format-standard","hentry","category-definition-of-the-day","category-faqs","tag-cyber-heist","tag-definition-of-the-day","tag-hacker","tag-phishing","tag-pretexting","tag-social-engineering"],"yoast_head":"\nDefinition of the Day: Pretexting - BankVault<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bankvault.com\/definition-of-the-day-pretexting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Definition of the Day: Pretexting - BankVault\" \/>\n<meta property=\"og:description\" content=\"Pretexting is a sibling of phishing and like siblings both have differences as well as similarities. Phishing emails use fear and urgency to drive users to take actions that compromise their system. Pretexting is much more positive \u2013 it centers around the hacker building a false sense of trust with the victim. The most prevalent […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bankvault.com\/definition-of-the-day-pretexting\/\" \/>\n<meta property=\"og:site_name\" content=\"BankVault\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BankVaultOnline\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-04T23:19:07+00:00\" \/>\n<meta name=\"author\" content=\"A. Yost\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bankvaultonline\" \/>\n<meta name=\"twitter:site\" content=\"@bankvaultonline\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"A. Yost\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Definition of the Day: Pretexting - BankVault","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bankvault.com\/definition-of-the-day-pretexting\/","og_locale":"en_US","og_type":"article","og_title":"Definition of the Day: Pretexting - BankVault","og_description":"Pretexting is a sibling of phishing and like siblings both have differences as well as similarities. Phishing emails use fear and urgency to drive users to take actions that compromise their system. Pretexting is much more positive \u2013 it centers around the hacker building a false sense of trust with the victim. The most prevalent […]","og_url":"https:\/\/www.bankvault.com\/definition-of-the-day-pretexting\/","og_site_name":"BankVault","article_publisher":"https:\/\/www.facebook.com\/BankVaultOnline\/","article_published_time":"2015-08-04T23:19:07+00:00","author":"A. Yost","twitter_card":"summary_large_image","twitter_creator":"@bankvaultonline","twitter_site":"@bankvaultonline","twitter_misc":{"Written by":"A. Yost","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bankvault.com\/definition-of-the-day-pretexting\/#article","isPartOf":{"@id":"https:\/\/www.bankvault.com\/definition-of-the-day-pretexting\/"},"author":{"name":"A. Yost","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/3cdb9c0092164dfe039b20c2972e655a"},"headline":"Definition of the Day: Pretexting","datePublished":"2015-08-04T23:19:07+00:00","dateModified":"2015-08-04T23:19:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bankvault.com\/definition-of-the-day-pretexting\/"},"wordCount":180,"commentCount":0,"publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"keywords":["cyber heist","definition of the day","hacker","phishing","pretexting","social engineering"],"articleSection":["Definition of the Day","FAQs"],"inLanguage":"en-AU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.bankvault.com\/definition-of-the-day-pretexting\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.bankvault.com\/definition-of-the-day-pretexting\/","url":"https:\/\/www.bankvault.com\/definition-of-the-day-pretexting\/","name":"Definition of the Day: Pretexting - BankVault","isPartOf":{"@id":"https:\/\/www.bankvault.com\/#website"},"datePublished":"2015-08-04T23:19:07+00:00","dateModified":"2015-08-04T23:19:07+00:00","breadcrumb":{"@id":"https:\/\/www.bankvault.com\/definition-of-the-day-pretexting\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bankvault.com\/definition-of-the-day-pretexting\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.bankvault.com\/definition-of-the-day-pretexting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bankvault.com\/"},{"@type":"ListItem","position":2,"name":"Definition of the Day: Pretexting"}]},{"@type":"WebSite","@id":"https:\/\/www.bankvault.com\/#website","url":"https:\/\/www.bankvault.com\/","name":"BankVault","description":"cybersecurity","publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bankvault.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.bankvault.com\/#organization","name":"BankVault","url":"https:\/\/www.bankvault.com\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","contentUrl":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","width":1212,"height":275,"caption":"BankVault"},"image":{"@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BankVaultOnline\/","https:\/\/x.com\/bankvaultonline"]},{"@type":"Person","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/3cdb9c0092164dfe039b20c2972e655a","name":"A. Yost","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/11403c3c24c2d02aecc26fa833deb0ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11403c3c24c2d02aecc26fa833deb0ca?s=96&d=mm&r=g","caption":"A. Yost"},"url":"https:\/\/www.bankvault.com\/author\/blogger\/"}]}},"_links":{"self":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/7288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/comments?post=7288"}],"version-history":[{"count":0,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/7288\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/media?parent=7288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/categories?post=7288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/tags?post=7288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}