Detecting computer security risk based on previously observed...
A common technique used by computer hackers is to compromise an electronic message account, e.g., using phishing or malware that gains access to the account, and then search the mail folders of the victim for e