January 28, 2008

Spies in the the Phishing Underground

Author: JT Smith

Well-known security researchers that have recently managed to infiltrate the phishing underground. In this interview, they expose the tactics and tools that phishers use, illustrate what happens when your confidential information gets stolen, discuss how phishers communicate and even how they phish each other.

Link: net-security.org


  • Security
Click Here!