Hackers, identity thieves, scam artist, spies or whatever you want to call them, no longer rely solely on attacking the military head on. Because security has been strengthened with advances in technology, adversaries take the easier route of using social engineering to get information or access