Answer:
Attackers use information gathered during reconnaissance in spear phishing to customize and tailor phishing messages for specific targets.
Attackers use information gathered during reconnaissance in spear phishing to customize and tailor phishing messages for specific targets.
You may be interested in:
Web Security MCQs - PART 2