Phishing is a ____ method of ____ sensitive information such as usernames, passwords and credit card details using ____ emails and websites. In a phishing attack, the attacker ____ to be a ____ person and ____ the user into opening an email, text or instant message. Next, the user is ____ into downloading an attachment, clicking a link or ____ sensitive information such as login ____. How can you ____ a phishing attack? They are not ____ and often contain ____ errors.

Leaderboard

Visual style

Options

Switch template

Continue editing: ?