How does social engineering work? What kind of information do they use to prepare?
How does it work? What kind of information do they want? One page paper.
a. https://money.cnn.com/2012/08/07/technology/walmart-hackdefcon/index.htm
b. https://www.symantec.com/connect/articles/social-engineeringfundamentals-part-i-hacker-tactics