From ecc22cc9aa892a20e5a20e569e3ff85dd590b4a7 Mon Sep 17 00:00:00 2001 From: Nils Date: Tue, 25 Jun 2019 19:08:48 +0200 Subject: [PATCH] Added tailgaiting as example (#30985) Added a (short description) of tailgating under the Some examples of Social Engineering hacks, as it is another form of these. --- guide/english/security/social-engineering/index.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/guide/english/security/social-engineering/index.md b/guide/english/security/social-engineering/index.md index b870b93bdd..7c65d33314 100644 --- a/guide/english/security/social-engineering/index.md +++ b/guide/english/security/social-engineering/index.md @@ -26,6 +26,8 @@ See "More Information" for a link to test your phishing knowledge and see if you * Lastly, the 419 scam, also known as Advanced-Fee Scam, is a real life example of social engineering. In Nigeria and other third world countries, people would manipulate people by connecting with people using emotional connections in order to scam money. Usually strategies would include: third world poor country status in need of donations or informing people they won scam money and asking for account numbers. These emails would be very convincing and many have fallen victims to these scams. +* Tailgating: Also called piggybacking and relating closely to Infiltrating, tailgating describes the act of following someone else - often people or group of people with access cards - into a building or secure area with or without their consent. + #### Prevention and Security Because Social Engineering requires little computer expertise, it is a readily-available tool for individuals who wish to access sensitive data.