A home user receives a call from a technician who claims to be with a virus control company. The technician explains that the user’s PC is infected with harmful viruses. The technician instructs the user how to get to the Event Viewer where all errors can be seen.
The technician claims this problem can be fixed for money. Which of the following threats has the user been a victim of?
B. Social engineering