1. How have phishing attacks compromised major systems?
Phishing attacks aim to steal information from the user’s computer and this is usually done through email messages that mimic those from a legitimate company, but which contain fraudulent information and fraudulent links. Once the link is clicked then the user’s personal information gets stolen. It can also be that the installation of a particular application or the opening of an email may cause Trojans or key loggers to be installed in the computer. These Trojans then work in the background to steal the user’s information.
The stolen information is used to launder money, steal identities, and access ...