Investigate a social engineering attack describing what has made this attack more successful and the information which was observed from this attack is sure to involve how could this attack be avoided? Give the examples and/or the details in order to support your ideas.