Washington Post Staff Writer
Wednesday, March 17, 2010
Wednesday, March 17, 2010
"Among the common schemes: phishing (in which e-mails direct a victim to fraudulent Web sites that mimic respectable entities, including banks), smishing (in which text messages bait a victim to download malicious spyware), pharming (in which malicious code on computer sends victims to bogus Web sites) and keylogging (in which hidden software monitors victims' keystrokes to collect passwords)."
...
Madden pointed to studies that show most people can be identified with three pieces of information: their sex, Zip code and date of birth. And seemingly anonymous profiles that catalogue preferences, such as movie lists on Netflix, can also be used to identify users.
No comments:
Post a Comment