Phishing

Background Deploying tricks to obtain sensitive information from people for malicious reasons is not a new concept, and has been in existence for a long time. Attacks related to social engineering has been evident on the course of existence of the internet, and even before the onset of the internet, criminal deployed other technological frameworks […]