If you’re reading this, it’s a blog post that’s not my regular write-up but more of an investigation and a hypothesis on the anatomy of a scam. I also put it together to raise awareness for those who read my blog and who might not be overtly technical-focused.
This article has been indexed from ZephrSec – Adventures In Information Security
Read the original article: