There is evidence that among global cybercriminals, phishing may already be passe.
In some countries, like Brazil, it has been eclipsed by an even more virulent form of electronic con. The use of keylogging programs that silently copy the keystrokes of computer users and send that information to the crooks
Tuesday, February 28, 2006
Subscribe to:
Post Comments (Atom)
Popular Posts
- AS400 Job Scheduler
- Using QCLRDTAQ to clear data queues in CL and RPG
- Java Examples - JExamples.com
- Lego Electronic Lab Kit Main
- iReport - OpenSource Java Reporting Tool
- (no title)
- What is QZHQSSRV job?
- Creating an as400 Query
- MobileTracker - Cingular announces EDGE Wireless WAN service
- Encrypt Data on as400 (QC3ENCDT, Qc3EncryptData)
No comments:
Post a Comment