Submission - Joint submission to the 2007 Review of the Electronic Funds Transfer (EFT) Code of Conduct to ASIC (May 2007)
Fraud and Identity Theft Resources
AusCERT, Haxdoor: Anatomy of an ID Theft Attack Using Malware, 12 December 2006, <http://www.auscert.org.au/render.html?it=7069>.
AusCERT, Managing Risks Associated with Online ID Theft for Government and Providers of e-Government Services, 24 November 2005, <http://www.auscert.org.au/render.html?it=5777>.
Evers J, Phishers come calling on VoIP, CNET, July 2006, <http://news.com.com/2100-7349_3-6092366.html>.
IBM developerWorks, The cranky user: What you can do about phishing, January 2006, <http://www-128.ibm.com/developerworks/web/library/wa-cranky60.html>.
Infidel Incorporated, Phishing 2.0: Next Generation Attacks Makes Current One Time Password Technologies Obsolete, 2005, <http://www.infidel.net/phishing.php>.
Out-Law.com, Phishing attack evades ABN Amro's two-factor authentication, 18 April 2007, <http://www.out-law.com//default.aspx?page=7967>.
Risk Management Magazine, Reeling ‘em in – tackling phishing, 15 March 2005, <http://www.riskmanagementmagazine.com.au/articles/BC/0C02C8BC.asp?Type=124&Category=1240>