{"id":75723,"date":"2013-04-17T16:33:24","date_gmt":"2013-04-17T11:03:24","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=75723"},"modified":"2013-04-17T16:33:24","modified_gmt":"2013-04-17T11:03:24","slug":"social-engineering-inforgraphic","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/social-engineering-inforgraphic\/","title":{"rendered":"How do Cyber Criminals get away with Social Engineering Tricks &#8211; Infographic"},"content":{"rendered":"<p>In an <a href=\"https:\/\/blogs.quickheal.com\/classic-lies-cyber-criminal-use\/\">earlier post<\/a>, we had discussed various tricks that cyber criminals use to get what they want. This infographic explains how the tricks are effectively executed to hack the human mind.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/04\/Tricks_a.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-75727 aligncenter\" alt=\"Tricks_a\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/04\/Tricks_a-99x300.jpg\" width=\"99\" height=\"300\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In an earlier post, we had discussed various tricks that cyber criminals use to get what they want. This infographic explains how the tricks are effectively executed to hack the human mind. &nbsp; &nbsp;<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55,32,285,164,289,21,41,148,133,129,24,300,151,303,304,293,6,30],"tags":[163,42,306,307,308,27,29,173,305,309,310],"class_list":["post-75723","post","type-post","status-publish","format-standard","hentry","category-android","category-apple","category-applications","category-cyber-crime","category-cyber-safety","category-email","category-facebook","category-faqs","category-hacker","category-hacktivism","category-malware","category-online-hoaxes","category-password","category-phishing","category-social-engineering-2","category-spam","category-tips","category-twitter","tag-cyber-crime","tag-facebook-scam","tag-fake-advertisement","tag-online-hoax","tag-online-scams","tag-scareware","tag-social-engineering","tag-spoofing","tag-twitter-scam","tag-twitter-scams","tag-yellow-journalism"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/75723"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=75723"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/75723\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=75723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=75723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=75723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}