Understanding spear phishing and whaling techniques