Right away adjust any compromised passwords and disconnect from the network any computer or gadget that’s contaminated with malware.Immediately after this phishing scam, attackers immediately moved on to email as a technique for seeking to gather useful intel. Phishing emails ranged in sophistication with the much less-than-convincing Nigerian pr