What Exactly Happens to Compromised Email Accounts?
Researchers from Agari entered credentials that didn’t belong to anyone into phishing sites and then waited to see what the phishers did next with the compromised credentials. The report found …