Begin forwarded message:

From: Dewayne Hendricks <[EMAIL PROTECTED]>
Date: February 27, 2006 8:18:17 AM EST
To: Dewayne-Net Technology List <[EMAIL PROTECTED]>
Subject: [Dewayne-Net] CYBERTHIEVES SILENTLY COPY AS YOU TYPE
Reply-To: [EMAIL PROTECTED]

[Note:  This item comes from friend John McMullen.  DLH]

CYBERTHIEVES SILENTLY COPY AS YOU TYPE

[SOURCE: New York Times, AUTHOR: Tom Zeller, Jr]
There is evidence that among global cybercriminals, phishing may already be passé. In some countries, like Brazil, it has been eclipsed by an even more virulent form of electronic con -- the use of keylogging programs that silently copy the keystrokes of computer users and send that information to the crooks. These programs are often hidden inside other software and then infect the machine, putting them in the category of malicious programs known as Trojan horses, or just Trojans.

<http://www.nytimes.com/2006/02/27/technology/27hack.html>
Weblog at: <http://weblog.warpspeed.com>



-------------------------------------
You are subscribed as [email protected]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

Reply via email to