On the anatomy of social engineering attacks