Opinions, projects, and resume.
AKA Hyjacking, Stolen Credentials, Account Verification Attacks
Google’s worked with UC Berkeley (and paper). Two sets of significant results:
However, phishing also collects phone numbers, geo location, and device profiles. This, combined with historical password enumeration, makes phishing even more successful.