I just got one. They used a person's name who I trust, but the email address is not hers. Plus the way it was worded was weird. Still, they are getting very sneaky.
Would the source of the attack be from the sender's system, since they used her name?
Would the source of the attack be from the sender's system, since they used her name?