Disconnect: Fear and Loathing

A counselor advises a couple that their personal information may have been compromised by someone with the online name, "Fear and Loathing." The counselor explains to Cindy how Fear and Loathing could have infected her computer and installed a keylogger through the use of a phishing email or link.

Public Discussion Questions


  1. What are some examples of a phishing attack?
  2. How can you protect yourself against a phishing attack?

Please sign in to add a discussion question.

Standards


No standards

Please sign in to add standards to this clip.

Public Pause Prompts


No pause prompts

Comments


Please sign in to write a comment.

Related Clips


Cybersecurity → Malware → Virus
Cybersecurity → Malware → Spyware
Cybersecurity → Malware → Worm
Law → Financial Fraud → Salami Slicing
Cybersecurity → Social Engineering → Pretexting
Cybersecurity → Phishing → Email
Cybersecurity → Malware → Keylogger
Cybersecurity → Phishing → Email
Cybersecurity → Malware → Ransomware