In California, Phishing's Become Less Attractive

Adams, John
December 2005
Bank Technology News;Dec2005, Vol. 18 Issue 12, p18
Trade Publication
The article reports on a state law which makes phishing a civil violation attracting a penalty of up to half a million dollar. The law has been introduced in the state of California. The bill had support of Microsoft and the Computing Technology Industry Association. It makes it unlawful for a person to use Internet to misrepresent himself as an online business unless he has authorization from that business. About $200 million has been lost by consumers in phishing attacks in the past two years.


Related Articles

  • If It Sounds Too Good...  // PN;Jun2010, Vol. 64 Issue 6, p75 

    The article focuses on the rise and consequences of mortgage-modification and rescue scams which take place through e-mails and phone calls. As stated, in these scams people are asked to give personal and tax information which helps scammers in committing identity theft.The clients are misguided...

  • Phishing gets between a rock and an easy place.  // MarketWatch: Financial Services;Sep2007, Vol. 6 Issue 9, p10 

    The article reports that a group known as the Rock Phish has introduced the most successful phishing attacks in Great Britain. MarkMonitor, a company that has developed its own anti-phishing strategy to deal with Rock Phish attacks, asserts that Rock Phishers have employed an anti-phishing...

  • Phishing Away Your Identity. Coldsborough, Reid // Business Journal (Central New York);10/5/2007, Vol. 21 Issue 40, p1B 

    The article focuses on phishing attacks in the U.S. in 2007. It is reported that the latest attacks are e-mails that appear to come from form the Internal Revenue Service trying to trick someone into revealing where his bank is and then the criminals send an email that appears to come from the...

  • WILLIAM PELGRIN. Mimoso, Michael S. // Information Security;Mar2006, Vol. 9 Issue 3, p72 

    Interviews William Pelgrin, director of New York's Office of Cyber Security and Critical Infrastructure Coordination (CSCIC) phishing scams. Reason for conducting the mock phishing exercises; Views on the impact of the phishing exercises on the state employees' trust in legitimate e-mails...

  • Using Security to Create Insecurity. Sausner, Rebecca // Bank Technology News;Jul2006, Vol. 19 Issue 7, p29 

    The article reports on the latest means being employed by phishers to obtain data from unsuspecting consumers. Phishers trick consumers into supplying personal data in the guise of making security checks. Other fraudulent methods used are scam call centers that mimic the target bank, e-mail...

  • E-Mail Mishap. Wolfe, Daniel; Bills, Steve // American Banker;10/7/2009, Vol. 174 Issue 185, p5 

    The article discusses a phishing attack on the technology web site site Neowin.net. Nearly 10,000 Hotmail usernames and passwords were posted online and it may be only a small part of a larger breach. Additional lists showed up containing e-mail account details for Gmail, Yahoo, Comcast,...

  • Brand Spoofing.  // Network Dictionary;2007, p74 

    An encyclopedia entry for Brand Spoofing is presented. It is also called phishing or carding. It refers to a scam where the perpetrator send out legitimate-looking electronic mails appearing to come from sites such as eBay/PayPal, MSN and Yahoo to gather personal and financial information from...

  • Hyperlink Spoofing.  // Network Dictionary;2007, p234 

    A definition of the term "hyperlink spoofing" is presented. Also known as web spoofing, hyperlink spoofing is a process by which an attacker is able to view and make changes to web pages that are transmitted to or from another computer. Hyperlink spoofing can be used in data phishing.

  • Phishing.  // Network Dictionary;2007, p374 

    A definition of the term "phishing," which refers to a scam where the perpetrator sends out legitimate-looking e-mails appearing to come from biggest Web sites to phish for personal and financial information from the recipient, is presented.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics