For this week, conduct some research for a security incident where social engineering was used to learn additional information about the target, to ultimately gain unauthorized access to system(s). Provide the class with the reference to the article(s) you read about the incident, and tell us what you have learned from the incident that you can use when preforming your own ethical hacking engagements.