SECURITY SERIES - PART 4 OF 5
Social Engineering, Doxing & Online Harassment
Published: February 2026 | Reading Time: 11 minutes
Series: Online Security for Everyday Users | Author: Sean Kevin Wyndham-Quin, Mac & PC Farnham
Previously in this series: We've covered
phishing,
malware, and
identity theft. Today we're exploring the psychological manipulation tactics criminals use and the darker side of online interaction—doxing, trolling, and harassment.
The Human Element
98% of cyber attacks rely on social engineering
1 in 3 UK adults experienced online harassment
£3.2 million lost to "CEO fraud" in UK businesses (2025)
Social Engineering: Hacking the Human
Social engineering is the art of manipulating people into divulging confidential information or performing actions that compromise security. Unlike technical hacking that exploits software vulnerabilities, social engineering exploits human psychology—our trust, fear, curiosity, and desire to be helpful.
Why it works: It's easier to trick someone into giving you their password than to crack encryption. Humans are often the weakest link in security.
Common Social Engineering Tactics
👔 Pretexting
Creating a fabricated scenario to obtain information.
Example: "I'm calling from IT support about your account" or "This is the tax office regarding unpaid taxes."
🎁 Baiting
Offering something enticing to lure victims.
Example: Free USB drives in car park, "Download free music" links, prize giveaways.
⚡ Urgency & Fear
Creating panic to bypass rational thinking.
Example: "Your account will be closed in 24 hours!" or "Suspicious activity detected!"
👑 Authority
Pretending to be someone important.
Example: "This is your boss," "Police here," "HMRC calling."
🤝 Quid Pro Quo
Offering help in exchange for information.
Example: "We'll give you free tech support if you download this tool."
🚪 Tailgating
Physical social engineering—following through secure doors.
Example: "Sorry, forgot my badge, can you let me in?"
Real-World Social Engineering Examples
The CEO Fraud
The Setup:
An accountant receives an urgent email that appears to be from the CEO:
"I'm in a confidential meeting with investors. Need you to wire £50,000 to this supplier immediately for an urgent acquisition. Don't discuss with anyone—this deal is highly sensitive and not yet public. Time is critical."
The Result:
The accountant, trusting the CEO's authority and responding to urgency, wires the money. The email address was spoofed: ceo@company-name.co.uk instead of ceo@companyname.co.uk
The Loss: £50,000 gone, likely unrecoverable
The Helpful IT Person
The Call:
"Hello, this is James from IT. We're rolling out a security update and need to verify your login credentials. Can you confirm your username and password?"
What's Really Happening:
There's no security update. A criminal is calling employees randomly, hoping someone will provide their credentials. Once they have access, they can steal data, install malware, or commit fraud.
Prevention:
Real IT departments never ask for passwords. Hang up and call IT through the official number to verify.
The Grandparent Scam
The Call:
Phone rings. A distressed voice: "Grandma, it's me! I've been in an accident abroad and I'm in jail. I need £5,000 for bail. Please don't tell Mum and Dad—they'll be so disappointed. Can you wire the money?"
The Psychology:
Exploits love, fear, and desire to help. Criminals research victims on social media to know grandchildren's names. The request for secrecy prevents verification.
Prevention:
Always verify through another family member. Establish family code words for emergencies.
How to Protect Yourself from Social Engineering
- Verify identity independently – Call back using official phone numbers from company website, not numbers provided by caller
- Question urgency – Legitimate organizations don't create artificial 24-hour deadlines
- Never give passwords or PINs – No legitimate organization will ever ask for these
- Be suspicious of authority – Criminals impersonate police, HMRC, banks, and bosses
- Trust your instincts – If something feels wrong, it probably is
- Establish verification protocols – Family code words for emergency calls
- Think before you click – Don't let urgency override caution
- Don't overshare online – Information used to make social engineering more convincing
- Educate family members – Elderly relatives are often targeted
- Use multi-factor authentication – Even if someone gets your password, they can't access accounts
Doxing: When Privacy Becomes a Weapon
Doxing (or doxxing) is the malicious publication of private or identifying information about someone online without their consent. The term comes from "dropping docs" (documents).
What Information Gets Exposed
- Full name, address, and phone number
- Email addresses and social media accounts
- Workplace details and employer contact
- Family members' information
- Financial details and banking information
- National Insurance or other ID numbers
- Photos, including of home and family
- Medical records or personal history
Why People Get Doxed
- Revenge or harassment after personal disputes
- Political disagreements or activism
- Online gaming conflicts (surprisingly common)
- Whistleblowing retaliation
- Stalking and intimidation
- Targeted because of profession (journalists, police, politicians)
Real Impact of Doxing
Victims have experienced:
- Harassment and threats at home and work
- Identity theft using exposed information
- "Swatting" – false emergency calls to their address
- Job loss due to workplace harassment
- Family members being targeted
- Need to relocate for safety
- Severe anxiety and fear
- Financial fraud
How Criminals Gather Information for Doxing
- Social media – Posts revealing location, workplace, family
- Public records – Electoral roll, property ownership, business registrations
- Data broker sites – Whitepages, 192.com, etc.
- Photo metadata – GPS coordinates embedded in images
- Username reuse – Tracking same username across platforms
- WHOIS data – Domain registration information
- Data breaches – Leaked information from hacks
- Social engineering – Tricking you into revealing information
How to Protect Yourself from Doxing
- Google yourself regularly – See what information is publicly available
- Use privacy settings on all social media (Facebook, Instagram, Twitter, LinkedIn)
- Don't overshare location – Avoid posting real-time locations, check-ins
- Use different usernames across platforms (makes tracking harder)
- Remove yourself from data brokers – Opt out of Whitepages, 192.com, etc.
- Turn off photo location services – Disable GPS tagging in camera settings
- Use P.O. Box or work address for online purchases when possible
- Hide WHOIS information – Use domain privacy protection
- Create separate email addresses – Personal, shopping, social media, work
- Be careful in photos – House numbers, street signs, car plates visible
- Remove personal info from resume – Don't include full address on public CVs
- Opt out of electoral roll marketing – Contact local council
If You've Been Doxed
- Document everything – Screenshots with timestamps, archives
- Report to platform where information was posted
- Contact police – Especially if threats made (report to 101 or Action Fraud)
- Secure all online accounts – Change passwords, enable 2FA
- Inform your employer if work details shared
- Monitor credit report for fraudulent activity
- Consider legal action – Doxing may violate Data Protection Act
- Request removal from search engines (Google has removal form)
- Notify family members if their information exposed
- Professional security review – Mac & PC Farnham can help secure devices
Trolling & Online Harassment
Trolling ranges from mildly annoying behavior to severe, coordinated harassment campaigns that can destroy lives.
Types of Trolling
| Type |
Behavior |
Severity |
| Light Trolling |
Posting controversial opinions to start arguments |
Low - Annoying |
| Flaming |
Posting insults and hostile messages |
Medium - Offensive |
| Harassment |
Sustained targeting of individual with abuse |
High - Harmful |
| Dogpiling/Brigading |
Coordinated group attacks on individual |
Severe - Devastating |
| Cyberstalking |
Persistent monitoring and harassment |
Critical - Dangerous |
Why People Troll
- Anonymity – No real-world consequences
- Attention-seeking – Negative attention still feeds ego
- Entertainment – Find reactions amusing
- Ideological warfare – Attacking opposing views
- Psychological issues – Sadism, personality disorders
- Group mentality – Peer pressure in online communities
Impact on Victims
- Anxiety, depression, and PTSD
- Fear and paranoia about online presence
- Reduced participation in online communities
- Sleep problems and health issues
- Professional consequences (trolls contacting employers)
- Relationship strain
- In extreme cases, self-harm or suicide
How to Handle Trolling & Harassment
- Don't feed the trolls – Engagement is what they want; starve them of attention
- Block immediately – Use platform blocking features liberally
- Report to platform – Twitter, Facebook, Instagram all have reporting systems
- Document everything – Screenshots with dates for potential legal action
- Adjust privacy settings – Limit who can contact or see your posts
- Take breaks – Step away from social media when overwhelmed
- Build support network – Friends and family who understand
- Don't share personal information – Don't give trolls ammunition
- Use mute/filter features – Filter out keywords and phrases
- Remember it's not about you – Trolls attack indiscriminately
When to Involve Authorities
Contact police immediately if harassment includes:
- Credible threats of violence
- Threats against family members
- Doxing (publishing personal information)
- Stalking behavior (monitoring movements)
- Swatting attempts or bomb threats
- Distribution of intimate images
- Threats to children
- Harassment that continues after blocking
UK Reporting:
- Immediate danger: Call 999
- Non-emergency: Call 101
- Cybercrime: Action Fraud 0300 123 2040
- Support: Victim Support 0808 168 9111
Protecting Children Online
Children and teenagers are particularly vulnerable to online harassment, cyberbullying, and social engineering.
Parental Guidance
- Open communication – Create environment where children feel safe discussing online issues
- Age-appropriate education – Teach about online dangers at appropriate level
- Monitor (don't spy) – Know what platforms they use and who they interact with
- Privacy settings – Help set up accounts with maximum privacy
- Parental controls – Use built-in controls on devices and routers
- No personal information – Teach never to share name, address, school
- Recognize cyberbullying – Changes in behavior, reluctance to use devices
- Report mechanisms – Ensure they know how to report abuse
- Set time limits – Healthy balance of online and offline activities
- Lead by example – Model good digital citizenship
WiFi Security & Physical Security
Public WiFi Dangers
- Man-in-the-middle attacks – Criminals intercept your communication
- Evil twin networks – Fake hotspots with legitimate-sounding names
- Packet sniffing – Monitoring unencrypted traffic
Protection on Public WiFi
- Use VPN always – Encrypts all traffic (NordVPN, ExpressVPN, ProtonVPN)
- Avoid sensitive activities – No banking or shopping on public WiFi
- Verify network name – Ask staff for correct WiFi name
- Turn off auto-connect – Prevent automatic joining of networks
- Use HTTPS only – Check for padlock in browser
- Turn off file sharing – In network settings
- Forget network after – Don't save public networks
Home WiFi Security
- Change default router password – "admin/admin" is not secure
- Use WPA3 encryption (or WPA2 if router older)
- Strong WiFi password – At least 16 characters, mix of types
- Update router firmware – Check manufacturer website regularly
- Disable WPS – Vulnerable to attacks
- Create guest network – Separate network for visitors
- Hide SSID (optional) – Makes network less visible
Action Plan: This Week's Challenge
7-Day Protection Challenge:
- Day 1: Google yourself—see what personal information is public
- Day 2: Review and tighten all social media privacy settings
- Day 3: Remove yourself from 2-3 data broker websites
- Day 4: Set up VPN on your devices for public WiFi use
- Day 5: Change home WiFi password to something strong and unique
- Day 6: Have conversation with family about verification protocols for emergency calls
- Day 7: Turn off location services in camera settings on phone
Need Help Securing Your Digital Life?
At Mac & PC Farnham, we can help you implement proper security measures, set up privacy protection, and recover from harassment or doxing situations.
Call 07769 804065
Or email: skwquin@macpcfarnham.uk
📧 Final Part Next Week! Part 5 brings everything together with practical tools, step-by-step security setup guides, and a complete protection strategy you can implement immediately.
About the Author: Sean Kevin Wyndham-Quin has over 20 years of experience in computer repair and security. At Mac & PC Farnham, he helps individuals and families protect themselves from online threats and harassment.
Tags: social engineering, doxing, trolling, online harassment, cyberbullying, cybersecurity, privacy protection, WiFi security, UK cybercrime, digital safety Farnham