Which of the following threats uses personalized information in an attempt at obtaining information?
A. Whaling
B. Impersonation
C. Spoofing
D. Spear phishing
Which of the following threats uses personalized information in an attempt at obtaining information?
A. Whaling
B. Impersonation
C. Spoofing
D. Spear phishing