This Yahoo article is claiming that phishers are increasingly employing key loggers to gather data which they later use for identity theft. |
At first phishing consisted only of a social engineering scam in which phishers spammed consumer e-mail accounts with letters ostensibly from banks. |
The requirements were partially a reflection of the threat landscape of more than two years ago, which was dominated by phishers. |
Use a popup blocker to prevent phishers and other attackers from tricking you into visiting questionable Web sites. |
All known spammers or phishers would, where identified, be banned from the system for five years or life. |