You would not allow a thief to enter your home, but what if the thief was disguised as someone familiar and tricked you into opening the door?
Phishing works in the same way – people open the doors to their data, giving up usernames, log-in information or other information to malicious e-mails, links or websites masquerading as reliable ones.
Please
Enjoy unlimited access to ST’s best work
- Exclusive stories and features on multiple devices
- In-depth analyses and opinion pieces
- ePaper and award-winning multimedia content