Email Phishing with Spyware: How to Defend Yourself?