Quote: CONTENTSIntroduction Methodology and key findings Part 1 – Malware Porn tags = Malware tags Mobile malware Credential hunters Part 2 – Phishing and spam Part 3 – Darknet insights Conclusions and advice