How to Phish for Geniuses

David Fletcher // Recently we were involved in an engagement where we expected to see a large number of Macs in the target environment. As an element of the engagement we decided to investigate options for delivery of malware to these devices. ┬áThe following outlines one of the methods we were able to explore and […]

Read the entire post here