Top
image: West Chester Technology Blog

Phishers’ techniques and behaviours, and what to do if you’ve been phished

July 28, 2017

Category:

Once a user has been phished, how long does it takes for the phishers to misuse the stolen credentials?

To discover the answer to that question and many others, Imperva researchers went undercover by creating 90 personal online accounts, including email and file sharing accounts with Google and Dropbox. Once the so-called honey pot accounts were active, the researchers deployed techniques to lure in the criminals and tracked them over the span of nine months.

Read More on Help Net Security