Hackers email legitimate looking mails (phishing) that usually have some form of urgency, and include a link. The user clicks on the link, the web page they are taken to looks like Microsoft, for example, and the user then enters their credentials to log in, thereby giving their username and password to the hacker.
Continue reading “Modus operandi for hackers”