> The key here is the hacker must create the most incisive, scary email that will short circuit your higher brain functions and get you to log in.
... and specifically by using the link in the email, yes?