A hacker sends a company employee a fraudulent email prompting him to change his password. The employee downloads a PDF, which is a keylogger posing as password security guidelines. Once the keylogger has been downloaded, the hacker gets the employee's credentials and logs into the system.
A counselor advises a couple that their personal information may have been compromised by someone with the online name, "Fear and Loathing." The counselor explains to Cindy how Fear and Loathing could have infected her computer and installed a keylogger through the use of a phishing email or link.