Thursday, January 18, 2007

Identity Theft: Part 4

Phising

Cyber-criminals use fraudulent email and web sites (known as mirror sites) that resemble online or retail sites. They are designed to fool users into revealing personal information, particularly credit card numbers, account numbers and passwords.
Hardware
n March 2005, the UK police found out that the London office of the Japanese bank Sumitomo has been under attack from a group of hackers for several months. The investigators initially believed that the criminals had used a Trojan to get into the bank's network. However, after several days of investigation, they found a tiny keystroke-recording device inserted at the back of the computer (where keyboard cable connects to the PC).

In fact a quick search on the Internet lists more than a half-dozen companies offering such devices. Some common characteristics of these products are: Can holds up to 2MB in memory; undetectable by software; transparent to the targeted machine's operating system; capable of recovering material on any PC; Price range varies from $20 to $200, depending on the memory; instructions and material available to build the device.

Labels: , ,

StumbleUpon Toolbar Stumble It!

0 Comments:

Post a Comment

<< Home

TECHTAGS