HP Sure Click Enterprise-Solution Brief
If an attacker can convince an end user to take an action they think is legitimate and innocuous, it’s quite easy to establish a beachhead on the user’s PC. From there they can develop their attack. The most common Social Engineering examples include getting a user to open an email attachment or clicking on an Internet link (URL). These attacks are almost always executed on end-user devices like Windows PCs.