Although these might seem like reputable file attachments, they are actually contaminated with malware which can compromise pcs as well as their documents.What must you do When you are a target of phishing? Compose down as lots of details of the attack as it is possible to remember. Note any data you may have shared, for example usernames, account