Download now Free registration required
Phish e-mails are constructed by con artists to look like legitimate communications, often from familiar and reputable companies, and usually ask victims to take urgent action to avoid a consequence or receive a reward. The desired response typically involves logging in to a Web site or calling a phone number to provide personal information. Sometimes victims need only click on links or open e-mail attachments for their computers to become infected by malicious software - known as malware - that allows phishers to retrieve the data they want or take control of the victim's computer to launch future attacks.
- Format: PDF
- Size: 473.81 KB