Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?
A. Hacking
B. Phishing
C. Spam
D. Cracking
Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?
A. Hacking
B. Phishing
C. Spam
D. Cracking