January 28, 2008
Spies in the the Phishing Underground
Author: JT Smith
Well-known security researchers that have recently managed to infiltrate the phishing underground. In this interview, they expose the tactics and tools that phishers use, illustrate what happens when your confidential information gets stolen, discuss how phishers communicate and even how they phish each other.