{"version":"1.0","provider_name":"Firewalls.com","provider_url":"https:\/\/www.firewalls.com\/blog","author_name":"Rafi Chowdhury","author_url":"https:\/\/www.firewalls.com\/blog\/author\/crashdi\/","title":"Social Engineering - Firewalls.com","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"JjKcsR3Y7P\"><a href=\"https:\/\/www.firewalls.com\/blog\/security-terms\/social-engineering\/\">Social Engineering<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.firewalls.com\/blog\/security-terms\/social-engineering\/embed\/#?secret=JjKcsR3Y7P\" width=\"600\" height=\"338\" title=\"&#8220;Social Engineering&#8221; &#8212; Firewalls.com\" data-secret=\"JjKcsR3Y7P\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.firewalls.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"What is Social Engineering? Social Engineering references the methods hackers employ to trick users into giving up sensitive information, whether it be by volunteering the information through an email, filling out a fraudulent web form, or downloading malware via an attachment or bad link. Social Engineering is how hackers get the user to behave as [&hellip;]"}