Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is considered:
Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?