The social engineering approach to ID theft is the only one that is currently effective. Only 3-5% of current system compromise comes from historical vectors; most current exploitation is of the “invite the vampire into your home” type.
University networks are extremely valuable to spammers and terrorists. They don’t care where they get the bandwidth from, and universities have fat pipes.
University networks are extremely valuable to spammers and terrorists. They dont care where they get the bandwidth from, and universities have fat pipes.<<<
Thanks, as I had not thought of your solution, that it was a fishing post of that I was not in doubt.
Reminds me of when Laura caught the jehadi sites on the Arkansas [?] motor department website a few years ago.
They teach each other their evil tricks of the trade, if only we could teach goodness as quickly.