This is a dedicated watch page for a single video.
Malevolent hacker, Morgan, stumbled upon the contact details of securinetech.org online. Dialing the number, Morgan deceitfully posed as a member of a vendor's technical support team. During the call, he alarmed an unsuspecting employee of securinetech about an imminent server compromise and persuaded them to comply with his instructions. Morgan skillfully coerced the victim into executing unconventional commands and installing malicious files, facilitating the extraction and transmission of sensitive information to his system. Which social engineering technique did Morgan employ from the options below?