[IP] CYBERTHIEVES SILENTLY COPY AS YOU TYPE
Begin forwarded message:
From: Dewayne Hendricks <dewayne@xxxxxxxxxxxxx>
Date: February 27, 2006 8:18:17 AM EST
To: Dewayne-Net Technology List <dewayne-net@xxxxxxxxxxxxx>
Subject: [Dewayne-Net] CYBERTHIEVES SILENTLY COPY AS YOU TYPE
Reply-To: dewayne@xxxxxxxxxxxxx
[Note: This item comes from friend John McMullen. DLH]
CYBERTHIEVES SILENTLY COPY AS YOU TYPE
[SOURCE: New York Times, AUTHOR: Tom Zeller, Jr]
There is evidence that among global cybercriminals, phishing may
already be passé. In some countries, like Brazil, it has been
eclipsed by an even more virulent form of electronic con -- the use
of keylogging programs that silently copy the keystrokes of computer
users and send that information to the crooks. These programs are
often hidden inside other software and then infect the machine,
putting them in the category of malicious programs known as Trojan
horses, or just Trojans.
<http://www.nytimes.com/2006/02/27/technology/27hack.html>
Weblog at: <http://weblog.warpspeed.com>
-------------------------------------
You are subscribed as roessler@xxxxxxxxxxxxxxxxxx
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-people/