{"id":461,"date":"2007-03-16T15:13:50","date_gmt":"2007-03-16T23:13:50","guid":{"rendered":"https:\/\/blog.mhvt.net\/?p=461"},"modified":"2007-05-26T23:33:07","modified_gmt":"2007-05-27T07:33:07","slug":"warning-bank-of-america-phishing-2","status":"publish","type":"post","link":"https:\/\/blog.mhvt.net\/?p=461","title":{"rendered":"Warning: Bank of America Phishing 2"},"content":{"rendered":"<p><a href=\"mac\/anti-spam\/anti-spam.jpg\"><img decoding=\"async\" src=\"mac\/anti-spam\/anti-spam.jpg\" alt=\"anti spam\" \/><\/a><\/p>\n<p>Several days ago, we reported a phishing activity that prompts Bank of America online users to urgently enter a website and provide account information.  And there comes again.  They use a website hosted at an organization for retirees to scam Internet users.  <!--more--><\/p>\n<p><a href=\"mac\/bank_of_america_phishing\/bank_of_america_phishing_02_1.gif\"><img decoding=\"async\" src=\"mac\/bank_of_america_phishing\/bank_of_america_phishing_02_1.gif\" width=159 height=\"157\" alt=\"anti spam\" \/><\/a> <a href=\"mac\/bank_of_america_phishing\/bank_of_america_phishing_02_2.gif\"><img decoding=\"async\" src=\"mac\/bank_of_america_phishing\/bank_of_america_phishing_02_2.gif\" width=177 height=\"173\" alt=\"anti spam\" \/><\/a><\/p>\n<p>Information indicated in the source docuement shows that this cybercriminal is possibly using a personal computer to host the ultimate phishing website through AT&#038;T&#8217;s Internet service.<\/p>\n<p>Criminals never quit until they get caught.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Several days ago, we reported a phishing activity that prompts Bank of America online users to urgently enter a website and provide account information. And there comes again. They use a website hosted at an organization for retirees to scam &hellip; <a href=\"https:\/\/blog.mhvt.net\/?p=461\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":342,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-461","post","type-post","status-publish","format-standard","hentry","category-internet-security"],"_links":{"self":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/posts\/461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/users\/342"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=461"}],"version-history":[{"count":0,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/posts\/461\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}