Security Market Segment LS
Thursday, 01 September 2005 10:43

Fake Yahoo Games steal player passwords


Game players take notice. Security vendor, Trend Micro has discovered a new phishing website that poses as Yahoo! Games, offering free games, online competition and free downloads.

Once a user enters their Yahoo ID and password, the information is then sent to a third party, which may use it for other purposes.

The phishing website is propagated via messages sent over Yahoo instant messenger that include no information beyond the link All users should avoid clicking on this link.

Trend Micro Australia and New Zealand senior systems engineer, Adam Biviano, says: 'This address could be closed at any time, with a new address replacing it to continue deceiving users. Online phishers are just like con artists on the street; they set a trap to deceive a large number of people each time. They continuously shut down their traps and quickly switch to other providers to avoid being caught.'

The phisher's hypothesis states that URLs used can only exist for approximately 52 hours. According to, phishing URLs last an average of 5.8 days, with the longest length of time being around one month.

The Yahoo Game phishing site even displays copyright and privacy statements, making it very difficult for the average person to determine its authenticity.

Subscribe to ITWIRE UPDATE Newsletter here

Active Vs. Passive DWDM Solutions

An active approach to your growing optical transport network & connectivity needs.

Building dark fibre network infrastructure using WDM technology used to be considered a complex challenge that only carriers have the means to implement.

This has led many enterprises to build passive networks, which are inferior in quality and ultimately limit their future growth.

Why are passive solutions considered inferior? And what makes active solutions great?

Read more about these two solutions, and how PacketLight fits into all this.


WEBINAR INVITE 8th & 10th September: 5G Performing At The Edge

Don't miss the only 5G and edge performance-focused event in the industry!

Edge computing will play a critical part within digital transformation initiatives across every industry sector. It promises operational speed and efficiency, improved customer service, and reduced operational costs.

This coupled with the new capabilities 5G brings opens up huge opportunities for both network operators and enterprise organisations.

But these technologies will only reach their full potential with assured delivery and performance – with a trust model in place.

With this in mind, we are pleased to announce a two-part digital event, sponsored by Accedian, on the 8th & 10th of September titled 5G: Performing at the Edge.


Stan Beer


Stan Beer co-founded iTWire in 2005. With 30 plus years of experience working in IT and Australian technology media, Beer has published articles in most of the IT publications that have mattered, including the AFR, The Australian, SMH, The Age, as well as a multitude of trade publications.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News