Skip to main content

Introduction to cyber security

This is an example of what could be a phishing email.

 2.4 Spotting a phishing email