Introduction
As we discussed in the previous chapter, phishers tend to take advantage of as
many elements of exploitation that are available to them. Unfortunately, unso-
licited bulk e-mail (UBE), otherwise known as spam, is one of the exploitable
elements. Phishing falls into the spam category of scams. Phisher ...