Mathematician and Security Researcher
The Blog
Final part of phishing with EV
A lot has changed since I wrote the first part of phishing with EV and this is the right time to release the final part of this series. Let’s get on.
First part of phishing with EV
This post is intended for a technical audience interested in how an EV SSL certificate can be used as an effective phishing device. I won't be held liable if someone uses this post for unlawful intentions. No one was harmed in this demonstration. Let's get on.