Fig. 2From: Don’t click: towards an effective anti-phishing training. A comparative literature reviewExample of an email based phishing attackBack to article page