{"id":325,"date":"2005-06-30T00:00:00","date_gmt":"2005-06-30T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/06\/30\/australian-banks-warn-of-new-scam\/"},"modified":"2021-12-30T11:37:02","modified_gmt":"2021-12-30T11:37:02","slug":"australian-banks-warn-of-new-scam","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/06\/30\/australian-banks-warn-of-new-scam\/","title":{"rendered":"Australian banks warn of new scam"},"content":{"rendered":"<p>Two large Australian banks are warning customers about a new email scam that may be targeting their accounts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The emails, which pretend to be from either the National Australia Bank (NAB) or ANZ, direct customers to fake internet sites.<\/p>\n<p>ANZ spokesman Paul Edwards said the bank had identified the &#8220;phishing&#8221; scam, which triggers the release of a trojan &#8211; a program that installs and runs on the victim&#8217;s computer &#8211; after they click on the website link.  Both banks said they had alerted customers through their websites and were working with the Australian Federal Police to have the fake internet sites taken down.  Edwards said the ANZ was still investigating the extent of the hoax while Sabin said the NAB had already received 200 emails from customers alerting it to the scam.<\/p>\n<p>http:\/\/www.xatrix.org\/article3921.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-325","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=325"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/325\/revisions"}],"predecessor-version":[{"id":2812,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/325\/revisions\/2812"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}