
Malware, Money Movers, and Ma Bell Mayhem! • Appendix A 373
Frequently Asked Questions
The following Frequently Asked Questions, answered by the authors of this book,
are designed to both measure your understanding of the concepts presented in
this appendix and to assist you with real-life implementation of these concepts. To
have your questions about this chapter answered by the author, browse to
vvww.syngress.com/solutions and click on the "Ask the Author" form.
Q: What is the popular technique that phishers use to perform "key logging"
using malware?
A: Formgrabbing.
Q: What is the site that's us"8| to retrieve the stolen data called?
A