It is the practice of exploiting social vulnerabilities to access sensitive information. These are often associated with phishing attacks or spear-phishing, in which an attacker sends an email or message that appears to come from a trusted source to obtain sensitive information or provoke behavior that can lead to a cyber-attack.