![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/spacer.gif)
|
Home
News
Vulnerabilities
Advisories
Press Releases
Search
Contribute
Backend
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/spacer.gif)
Resources
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/spacer.gif)
Reviews
Articles
Interviews
Editorials
Viruses
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/spacer.gif)
Events
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/spacer.gif)
Webcasts
Conferences
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/spacer.gif)
Software
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/spacer.gif)
Linux
Windows
Pocket PC
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/spacer.gif)
Newsletter
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/spacer.gif)
Current Issue
Subscribe
Archive
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/spacer.gif)
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/ads/gfi2004/GFI-Q2-left1.gif)
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/ads/infosec2.gif)
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/ads/thawte-lijevo.gif)
|
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/spacer.gif)
|
Feds nab teen who scammed AOL
Posted by Mirko Zorz - LogError
Tuesday, 22 July 2003, 2:52 AM CET
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/news-divider.gif)
U.S. regulators said on Monday they had charged a 17-year-old boy with using "spam" e-mails and a fake AOL Web page to trick people out of their credit-card information and steal thousands of dollars.
Officials at the Federal Trade Commission said they had agreed to settle their case against the teenager, who was not identified because of his age, after he agreed to pay back $3,500 he had stolen, and to submit to a lifetime ban on sending spam.
It's the first enforcement action the FTC has taken against an Internet "phishing" scam -- the use of spam, or unwanted junk e-mail, to lure computer users to look-alike websites, where they are deceived into forking over personal financial data.
"We're only beginning to discover the extent of these e-mails. They're only beginning to proliferate right now," FTC commissioner Mozelle Thompson told a news conference.
In the case cited on Monday, the teenager's e-mails told recipients they needed to update their AOL billing information and instructed them to click on a hyperlink connected to the "AOL Billing Center."
[ Read more ]
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/news-divider.gif)
Related items
Back to main page
|
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/spacer.gif)
|
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/ads/thawte-desno.gif)
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/ads/infosec3.gif)
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/ads/gfi2004/GFI-Q2-right2-1.gif)
|
![](http://library.vu.edu.pk/cgi-bin/nph-proxy.cgi/000100A/http/web.archive.org/web/20040503193701im_/http:/=2fwww.net-security.org/images/spacer.gif)
|