From: http://www.infoworld.com/article/05/01/21/04FEphishing_1.html?source=NLC-WS2005-01-26
Phishers are employing increasingly sophisticated techniques, such as malicious code buried in images, keystroke-logging applications that download as soon as an e-mail is opened, and spoofed Web sites that look totally legitimate — right down to the “security” padlock in the browser. So I think that "malicious code" or "keystroke-logging applications" falls into the realm of clamav ... For a good read ... http://www.antiphishing.org/ -- Ken Jones _______________________________________________ http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users