Mike, a user, receives an email from his grandmother stating that she is in another country and needs money. The email address belongs to his grandmother. Which of the following attacks is this?
A.
Man-in-the-middle
B.
Spoofing
C.
Relaying
D.
Pharming