Answer:
Attackers use information gathered during reconnaissance in vishing to customize and tailor phishing messages for specific targets.
Attackers use information gathered during reconnaissance in vishing to customize and tailor phishing messages for specific targets.
You may be interested in:
Web Security MCQs - PART 2