Gangs run mass-scale romance cons with phished dating-site logins


I think the rule goes something like this:

Every communication protocol, application or application feature that anyone can devise will sooner or later be used:

  1. To transmit or display spam
  2. To display pornography
  3. To implement a scam
  4. All of the above

Addendum: It will happen sooner rather than later.

This topic was automatically closed after 5 days. New replies are no longer allowed.