How Criminals Exploit Technology for Phishing Attacks