Attempting to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
Learn the Terms
Keeping up with technical terms can be a struggle.
Review our Glossary of Terms to learn more.
Testimonial
-
You and your team have done wonders for WEI. Thank you for all that you have done.
Joshua A., Waterborne Environmental, Inc.