In a vishing attack, who could you impersonate when phoning somebody?
That's right! The scheme can involve hearing from anybody the victim trusts.
Almost! The scheme can involve hearing from anybody the victim trusts.