The document discusses social engineering techniques used by hackers such as phishing, identity theft, and exploiting human weaknesses like greed, fear and sympathy. It notes that social networks provide a huge surface for attacks with little required skill for reconnaissance. Statistics are presented on social engineering attacks and vulnerabilities. The document questions whether social media users are paying attention to security issues like content protection, hacks, and malicious applications. It suggests that focusing only on social networks overlooks the broader topic of social engineering.