An attacker convinces the victim to contact them for help.
An attacker poses as a helpful IT support representative and offers to fix the victim's computer or solve a problem.
An attacker offers something in exchange for access to sensitive information.
An attacker impersonates a trusted source to gain access to sensitive information.
All courses were automatically generated using OpenAI's GPT-3. Your feedback helps us improve as we cannot manually review every course. Thank you!