Spies in the the Phishing Underground

16

Author: JT Smith

Well-known security researchers that have recently managed to infiltrate the phishing underground. In this interview, they expose the tactics and tools that phishers use, illustrate what happens when your confidential information gets stolen, discuss how phishers communicate and even how they phish each other.

Link: net-security.org

Category:

  • Security