Spear Phishing
Most computer users are familiar with tactics that exploit network vulnerabilities such as viruses, worms, and Trojan horses, but few are familiar with techniques such as social engineering and phishing scams a.k.a. "Spear Phishing." (Courtesy photo)