"Internet-based social networking sites have created a revolution in social connectivity. However, con artists, criminals, and other dishonest actors are exploiting this capability for nefarious purposes. There are primarily two tactics used to exploit online social networks. In practice, they are often combined. [1.] Computer savvy hackers who specialize in writing and manipulating computer code to gain access or install unwanted software on your computer or phone. [2.] Social or human hackers who specialize in exploiting personal connections through social networks. Social hackers, sometimes referred to as 'social engineers,' manipulate people through social interactions (in person, over the phone, or in writing). Humans are a weak link in cyber security, and hackers and social manipulators know this. They try to trick people into getting past security walls. They design their actions to appear harmless and legitimate."
Federal Bureau of Investigation: https://www.fbi.gov/