| ||
Voice phishing is on the same exponential path that spyware and traditional phishing have taken. These types of financially lucrative attacks typically follow the same growth curve; once the tools to facilitate exploitation are disseminated to the evildoers , there is typically a tipping point of several months whereby the attack starts to enter the mainstream (see Figure 15-5).