Phishing
I try to obtain particular information such as logins, passwords and credit card information for the attempt to replicate layouts of trusted institutions, mainly for e-mails.
I try to obtain particular information such as logins, passwords and credit card information for the attempt to replicate layouts of trusted institutions, mainly for e-mails.