Manipulation with the aim of getting people to give up confidential information through trickery and deception rather than technical exploits. These attacks often take advantage of emotions, trust, or habit in order to convince individuals to take actions, such as clicking a fraudulent link, visiting a malicious website, or giving up login credentials. (Adapted from Forcepoint.)