New DIY email harvester released in the wild

April 16, 2012By Dancho Danchev

In order for cybercriminals to launch, spam, phishing and targeted attacks, they would first have to obtain access to a “touch point”, in this case, your valid email address, IM screen name, or…read more

true