nitter
Bil Corry
@bilcorry
18 May 2015
How to find "highly vulnerable victims" for your phishing campaign [PDF] Sonar Phishing
ieee-security.org/TC/SP2015/…
May 18, 2015 · 10:38 PM UTC