A family donates an old computer to a charity without erasing the hard drive first. The family may become a victim of:

eavesdropping.

social engineering.

vishing.

dumpster diving.

identity theft.