Watch this video on YouTube
Which attack method involves obtaining sensitive information from users through trickery and manipulation?