This attack uses social engineering techniques to trick users into accessing a fake Web site and divulging personal information. Attackers send a legitimate-looking e-mail asking users to update their information on the company’s Web site, but the URLs in the e-mail actually point to a false Web site.
A.
Wiresharp attack
B.
Switch and bait attack
C.
Phishing attack
D.
Man-in-the-Middle attack
C