IDNLearn.com: Where your questions meet expert advice and community support. Join our interactive community and access reliable, detailed answers from experienced professionals across a variety of topics.

John downloaded alten cleaner, a program that poses as a computer registry cleaner, on his computer. Once he installed the program on his computer, the program illegitimately gained access to john’s passwords and credit card information. In this scenario, it is evident that john was a victim of _____.