
38 Cyberpower
and hold great value. They can be obtained by deceiving the user. Frequently,
fraudsters pose as entities known to the Internet user, such as a bank or a
manager of his messaging service, and ask him – always with some credible
justication – to communicate his personal data by phone, through a website
or by mail. This type of activity, consisting of manipulating people in order
to lead them to take specic actions or to reveal condential information, is a
kind of condence trick known as “social engineering.” Taken in by the appar-
ent good faith of the request, the user provides voluntarily the kind of informa-
tion that will ...