Fraudulent emails pretending to be from a legitimate company to trick people into clicking malicious links or attachments. They often threaten dire consequences if action isn’t taken immediately.
Leaving infected USB drives or other devices in public places, hoping victims will plug them into their computers and launch malware.
Making up a believable cover story to obtain private data. For example, claiming to need a password reset code to access an account.
Offering a service or benefit in exchange for information. An attacker may pose as IT support and request a password to perform a fake system check.
Following an authorized person into a secure building or area without proper permission.