Phishing technology revealed
Ever wondered exactly what information is gathered from a computer that falls foul of a phishing attack?
F-Secure managed to get hold of some software that the phishers use to interpret the data they steal from the likes of you and me.
See here for the full story with screenshots.
0 comments:
Post a Comment