A spear phisher reports the target to assemble data to pose as anyone or entity the target genuinely trusts—a colleague, boss, co-employee, colleague, trustworthy vendor or money institution—or to pose as being the focus on unique. Social media and networking internet sites—in which folks publicly congratulate coworkers, endorse colleagues an