How would you detect a phishing email ? Imagine a scenario in which a trick message comes through by means of virtual en