An attacker impersonates a trusted source to gain access to sensitive information.
An attacker offers something in exchange for access to sensitive information.
An attacker convinces the victim to contact them for help.
An attacker poses as a helpful IT support representative and offers to fix the victim's computer or solve a problem.
All courses were automatically generated using OpenAI's GPT-3. Your feedback helps us improve as we cannot manually review every course. Thank you!