Phishing researcher 'targets' the unsuspecting; Executes online attacks as part of experiments aimed at improving security.

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Author(s): Brodkin, Jon
  • Source:
    Network World. 2007, pages. 15