Submission - Joint submission to the 2007 Review of the Electronic Funds Transfer (EFT) Code of Conduct to ASIC (May 2007)

Fraud and Identity Theft Resources

AusCERT, Haxdoor: Anatomy of an ID Theft Attack Using Malware, 12 December 2006, <>.

AusCERT, Managing Risks Associated with Online ID Theft for Government and Providers of e-Government Services, 24 November 2005, <>.

Evers J, Phishers come calling on VoIP, CNET, July 2006, <>.

IBM developerWorks, The cranky user: What you can do about phishing, January 2006, <>.

Infidel Incorporated, Phishing 2.0: Next Generation Attacks Makes Current One Time Password Technologies Obsolete, 2005, <>., Phishing attack evades ABN Amro's two-factor authentication, 18 April 2007, <>.

Risk Management Magazine, Reeling ‘em in – tackling phishing, 15 March 2005, <>