A company help desk has received several reports that employees have experienced identity theft and compromised accounts. This occurred several days after receiving an email asking them to update their personal bank information.
Which of the following is a vulnerability that has been exploited?
A . Trojan horses
B . Phishing
C . Improperly configured accounts
D . Forged certificates
E . Untrained users
Answer: E