Craig likes to work on his computer at his local coffee shop, but people around him may be able to see what he is doing, including entering passwords for his accounts. This method of gaining confidential information is referred to as ________.

(A) phishing
(B) shoulder surfing
(C) man-in-the-middle attacks
(D) spear phishing