« Book Review: Network Forensics, Tracking Hackers Through Hyperspace | Main | Domain Shutdowns, Suspensions, & Seizures… Oh, My! »

Tuesday, 07 August 2012

Comments

Feed You can follow this conversation by subscribing to the comment feed for this post.

Interesting. Another timing issue that I've wondered about is how long from when a victim provides credentials until those credentials are used by the phisher? If we followup on reported spam by contacting all recipients, we will hear from a few who gave away their password. But we rarely see the evidence that the password has been used yet by the phisher.

The comments to this entry are closed.

Find me on Mastodon and Facebook
My Photo