Phishing: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
Line 4: | Line 4: | ||
==Phishing Attacks== | ==Phishing Attacks== | ||
====Keyloggers==== | ====Keyloggers==== | ||
These are spywares that can get installed either into a web browser or as a device driver. They record the user’s input to the computer by recording the keyboard keystrokes or mouse click. This information will be then sent to the spyware owner. These spywares can cause severe data leak. | |||
===Torpig-family Trojan=== | ===Torpig-family Trojan=== | ||
===Session Hijackers=== | ===Session Hijackers=== |
Revision as of 11:59, 31 July 2008
Study Guide
Background
Phishing Attacks
Keyloggers
These are spywares that can get installed either into a web browser or as a device driver. They record the user’s input to the computer by recording the keyboard keystrokes or mouse click. This information will be then sent to the spyware owner. These spywares can cause severe data leak.