Disconnect: Fear and Loathing
Cybersecurity → Phishing → Link Manipulation
A counselor advises a couple that their personal information may have been compromised by someone with the online name, "Fear and Loathing." The counselor explains to Cindy how Fear and Loathing could have infected her computer and installed a keylogger through the use of a phishing email or link.
Public Discussion Questions
What are some examples of a phishing attack?
How can you protect yourself against a phishing attack?