Fraudsters and cybercriminals continue to find creative ways to exploit technology and human weakness to facilitate their crimes. Another new exploit they are using is hijacking popular Google search terms, typically targeting bank sites, and then inserting HTML into the legitimate response pages to get end-users to provide personally identifiable information (PII), typically website user IDs and passwords, often in conjunction with keyloggers they download to the victims’ computers.
Posts Tagged ‘key logger’
Keyloggers + Social Engineering = Identity Theft: Fraudsters Exploit Human Frailties with Seductive Messages
Friday, April 27th, 2007Tags:awareness and training, cybercrime, google, identity theft, Information Security, IT compliance, key logger, policies and procedures, privacy, risk management, social engineering
Posted in Information Security, Privacy and Compliance, Privacy Incidents | 1 Comment »