{"id":27241,"date":"2021-08-18T16:52:00","date_gmt":"2021-08-18T14:52:00","guid":{"rendered":"https:\/\/perseus.de\/social-engineering-hacking-people\/"},"modified":"2026-03-30T15:37:29","modified_gmt":"2026-03-30T13:37:29","slug":"social-engineering-hacking-people","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/","title":{"rendered":"Social Engineering \u2013 Hacking People"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27241\" class=\"elementor elementor-27241 elementor-3446\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27240\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1-300x200.jpg 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Siavash Ghanbari via Unsplash<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3aa964d2 e-flex e-con-boxed e-con e-parent\" data-id=\"3aa964d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d35cbff e-con-full e-flex e-con e-child\" data-id=\"d35cbff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0ceb4bf e-con-full e-flex e-con e-child\" data-id=\"0ceb4bf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6804876 elementor-widget elementor-widget-text-editor\" data-id=\"6804876\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>18.08.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e29f2f0 elementor-widget elementor-widget-heading\" data-id=\"e29f2f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Social Engineering \u2013 Hacking People<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c32000 elementor-widget elementor-widget-text-editor\" data-id=\"8c32000\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity | Attack Vectors | The human factor | Prevention<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a4dc799 e-con-full e-flex e-con e-child\" data-id=\"a4dc799\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9ce1fe elementor-widget elementor-widget-text-editor\" data-id=\"d9ce1fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Most people have heard the term &#8220;social engineering&#8221; before. But very few can imagine anything concrete by it. We provide insights!  <\/strong><\/p><p>Put simply, social engineering means influencing or deceiving a person. Social engineering also plays a major role in IT security. <\/p><p><strong>But why?<\/strong><\/p><p>Hackers are like many people. You want to achieve the maximum result with as little effort as possible. Attacks on computers, operating systems or networks are often complex and very extensive. If cybercriminals cannot exploit existing security gaps in software and hardware, they have to put in a lot of effort to successfully carry out an attack on a company. First, a lucrative target must be scouted out. Firewall, VPN, and other protection mechanisms must then be overcome. Gaps and exploits have to be found and ultimately they have to work.      <\/p><p>The technical protection that companies apply today to ward off cyber attacks is relatively high. In this respect, it is quite difficult for cybercriminals to overcome systems and penetrate the inside of the company&#8217;s IT. In order to achieve their goal, hackers must use alternative attack surfaces. The human being is in the sights and serves as an ideal gateway. Compared to technical defense, there is hardly any investment in the human factor.    <\/p><p><strong> <\/strong><\/p><h4><strong>The human factor as a security risk<\/strong><\/h4><p>Cybercriminals are aware of this security risk. They take advantage of this and target a company&#8217;s employees. This can be done directly through a personal call or indirectly through an e-mail.  <\/p><p>Also interesting: In its recently published <a href=\"https:\/\/www.bitkom.org\/Presse\/Presseinformation\/Angriffsziel-deutsche-Wirtschaft-mehr-als-220-Milliarden-Euro-Schaden-pro-Jahr\">study<\/a> , Bitkom confirms that a large number of attacks start with social engineering. 41 percent of the companies surveyed said that there were such attempts: 27 percent of those surveyed contacted them by phone and 24 percent by e-mail. <\/p><p>But the goal is always the same. The hacker wants to gain access to sensitive data, documents and information (e.g. login information or bank details) or he wants to take a specific action (e.g. transfer a sum of money)* <\/p><p><strong> <\/strong><\/p><h4><strong>Why does social engineering work?<\/strong><\/h4><p>This is easy to explain. Cybercriminals use methods that are familiar to manipulate people. Social engineering is encountered almost every day. Be it in dealing with friends, family members or even strangers. With rhetorical means or various psychological approaches, people can be guided and motivated to behave in a certain way. Social engineering can be described as a psychological weapon.     <\/p><p>You can read more about the influence of human behavior in the course of social engineering <a href=\"https:\/\/www.informatik-aktuell.de\/betrieb\/sicherheit\/social-engineering-angriffe-und-die-psychologie-dahinter.html\">here <\/a>.<\/p><p>In doing so, the other person must be specifically addressed. Depending on the character, there are other incentives that can appeal to hackers. For example, one employee reacts particularly to flattery, another to special appreciation and yet another reacts particularly to pressure. With the right stimuli, it is possible for cybercriminals to influence people to deliver the desired result.   <\/p><p><strong> <\/strong><\/p><h4><strong>Phishing, the most common form of social engineering<\/strong><\/h4><p>In IT security, social engineering can occur in very different forms that could not be more different. In addition to pretexting, tailgating or CEO fraud, phishing** is one of the most widespread types. <\/p><p>In phishing, cybercriminals try to obtain sensitive and confidential information using e-mails, fake websites or other methods. Phishing also addresses employees more or less personally. Phishing campaigns are particularly successful if the content of the phishing email is tailored to the addressee or if the recipient feels addressed. According to a study by the US company <a href=\"https:\/\/www.proofpoint.com\/uk\/resources\/threat-reports\/state-of-phish\">Proof Points<\/a>, the following hooks worked particularly well in 2020\/2021:   <\/p><ol><li>Phishing campaigns that address Corona, COVID-19 and related health alerts<\/li><li>Phishing campaigns that provide information about software used in the company, e.g. Microsoft Exchange or Outlook<\/li><li>Phishing campaigns that offer employee benefits, e.g. free month on Netflix, or vouchers on Amazon and Starbucks<\/li><\/ol><p>The last few months have clearly shown this. The threat of phishing attacks is constantly increasing. According to the ENISA report, the number of phishing attacks via email increased by more than 600 percent in one month at the beginning of 2020. Perseus can also confirm that phishing attacks are increasing. A study published by Perseus in late summer 2020 shows that more than half of cyberattacks in 2020 were due to phishing.    <\/p><p>You can download the complete study on cybersecurity in the home office free of charge here.<\/p><p><strong> <\/strong><\/p><h4><strong>How do companies protect their employees?<\/strong><\/h4><p>Sustainable protection against social engineering and phishing attacks, among other things, requires a sustainable cybersecurity concept. With the same resources that a company spends on technical defense, it should also invest in the &#8220;human firewall&#8221;. Perseus offers such an awareness package. With extensive online training, useful hints and tips and, above all, automated phishing email simulations, employees are specifically sensitized to attack patterns, trained in dealing with phishing emails and thus noticeably raise the cybersecurity level in the company.   <\/p><h6>* Source: Current survey by Bitkom | August 2021. You can find more content <a href=\"https:\/\/www.bitkom.org\/Presse\/Presseinformation\/Angriffsziel-deutsche-Wirtschaft-mehr-als-220-Milliarden-Euro-Schaden-pro-Jahr\">here<\/a>.<br>** The term phishing here also includes subtypes such as spear phishing, voice phishing \/ vishing, smishing, social media attacks, business email compromise, etc. <\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Most people have heard the term &#8220;social engineering&#8221; before. But very few can imagine anything concrete by it. We provide insights!  <\/p>\n","protected":false},"author":3,"featured_media":27240,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27241","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social Engineering \u2013 Hacking People - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering \u2013 Hacking People - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Most people have heard the term &quot;social engineering&quot; before. But very few can imagine anything concrete by it. We provide insights!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-18T14:52:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T13:37:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/social-engineering-hacking-people\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/social-engineering-hacking-people\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Social Engineering \u2013 Hacking People\",\"datePublished\":\"2021-08-18T14:52:00+00:00\",\"dateModified\":\"2026-03-30T13:37:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/social-engineering-hacking-people\\\/\"},\"wordCount\":847,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/social-engineering-hacking-people\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/social-engineering-hacking-people\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/social-engineering-hacking-people\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/social-engineering-hacking-people\\\/\",\"name\":\"Social Engineering \u2013 Hacking People - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/social-engineering-hacking-people\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/social-engineering-hacking-people\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg\",\"datePublished\":\"2021-08-18T14:52:00+00:00\",\"dateModified\":\"2026-03-30T13:37:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/social-engineering-hacking-people\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/social-engineering-hacking-people\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/social-engineering-hacking-people\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg\",\"width\":768,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/social-engineering-hacking-people\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Engineering \u2013 Hacking People\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Engineering \u2013 Hacking People - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/","og_locale":"en_US","og_type":"article","og_title":"Social Engineering \u2013 Hacking People - Perseus Technologies","og_description":"Most people have heard the term \"social engineering\" before. But very few can imagine anything concrete by it. We provide insights!","og_url":"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/","og_site_name":"Perseus Technologies","article_published_time":"2021-08-18T14:52:00+00:00","article_modified_time":"2026-03-30T13:37:29+00:00","og_image":[{"width":768,"height":512,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Social Engineering \u2013 Hacking People","datePublished":"2021-08-18T14:52:00+00:00","dateModified":"2026-03-30T13:37:29+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/"},"wordCount":847,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/social-engineering-hacking-people\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/","url":"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/","name":"Social Engineering \u2013 Hacking People - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg","datePublished":"2021-08-18T14:52:00+00:00","dateModified":"2026-03-30T13:37:29+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/social-engineering-hacking-people\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg","width":768,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/social-engineering-hacking-people\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Social Engineering \u2013 Hacking People"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27241"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27241\/revisions"}],"predecessor-version":[{"id":27242,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27241\/revisions\/27242"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27240"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}