After scammers duped a friend with a hacked Twitter account and a deal on a MacBook, I enlisted the help of a fellow threat researcher to trace the criminals offline identities.
After scammers duped a friend with a hacked Twitter account and a deal on a MacBook, I enlisted the help of a fellow threat researcher to trace the criminals offline identities.