The scammers automatically created iOS accounts with valid email accounts, then automatically used stolen cards to buy and resell stuff.
This post appeared first on Naked Security Blog by Sophos
Author: Lisa Vaas
This post appeared first on Naked Security Blog by Sophos
Author: Lisa Vaas