Digital Special Collection Portal

How criminals manage, use stolen data following phishing attacks


Citation

Bernama (2026) How criminals manage, use stolen data following phishing attacks. The Sun (Malaysia).

Abstract

Download File / URL

[thumbnail of How criminals manage, use stolen data following phishing attacks.png] Image
How criminals manage, use stolen data following phishing attacks.png

Download (476kB)

Additional Metadata

Item Type: Newspaper
Date: 12 January 2026
Faculty/Centre/Office: Faculty of Data Science and Computing
URI: http://discol.umk.edu.my/id/eprint/16379
Statistic Details: View Download Statistic

Edit Record (Admin Only)

View Item View Item

The Office of Library and Knowledge Management, Universiti Malaysia Kelantan, 16300 Bachok, Kelantan.
Digital Special Collection (UMK Repository) supports OAI 2.0 with a base URL of http://discol.umk.edu.my/cgi/oai2