In my presentation - following the topic that was begun on Networkshop conference - I analyze the sources of unwanted e-mails, show some examples about their destructiveness, and discuss the specialities of Hungarian phishing.Lire moins