Here, applicant Willy tells us how the technique of phishing enables hackers to extract cybernauts’ banking data. <br /> <br />© 2015 W&CIE/CA : Reproduction and distribution prohibited on any media (Internet included) without authorisation <br /> <br />Credits : Cigref - Agence W - Production Windsor