Page Contents Phishing attack at a glance1. Email Phishing2. Spear Phishing3. Whaling4. Phone Phishing5. Clone Phishing.Conclusion Phishing attack at a glance According to