The tactic of manipulating, influencing or deceiving a victim in order to gain control over a computer system to steal personal or financial information.
The tactic of manipulating, influencing or deceiving a victim in order to gain control over a computer system to steal personal or financial information.