This document discusses social engineering techniques used by hackers to manipulate people into revealing confidential information. It begins by providing examples of successful social engineering attacks against major companies. It then explains the basics of social engineering, focusing on establishing trust and relationships to gain access. Several classic and modern types of social engineering techniques are outlined, such as phishing and using social media like Facebook. The document gives a hypothetical example of how to use a fake Facebook profile to sabotage an employee's life. It concludes by advising on how to identify and protect against social engineering attacks.