Microsoft takes action against 100 phishers in EMEA

Microsoft is initiating over 100 legal actions across Europe, the Middle-East and Africa (EMEA) against online fraudsters.

Microsoft is initiating over 100 legal actions across Europe, the Middle-East and Africa (EMEA) against online fraudsters.

Microsoft today announced its plan at a Brussels technology conference hosted by European ISPs.

Neil Holloway, Microsoft European president, unveiled a law enforcement campaign that will target cyber-criminals behind phishing attacks.

Microsoft said that by the end of June 2006 it will have initiated 100 legal actions in Europe, the Middle-East and Africa against individuals suspected of committing online fraud.

The company said over 50 of these actions would have already started by the end of this month.

“Phishing is a crime and undermines consumers’ trust in the internet and is an impediment to European policy-makers’ and industries’ efforts to boost citizens’ use of innovative and valuable internet services,” said Holloway.

The European legal actions are linked to Microsoft’s wider Global Phishing Enforcement Initiative (GPEI), launched to co-ordinate and expand the company’s anti-phishing efforts worldwide.

Bernhard Otupal, crime intelligence officer at Interpol’s financial and high-tech crime unit, said, “Partnership between Interpol and Microsoft has been of immense benefit to police in Interpol’s member countries, especially in relation to the training of officers in the latest technological advances.”

As part of its efforts, Microsoft is bringing legal actions against alleged phishers in Turkey, France, Spain, Morocco, the UK, Germany, Austria, Egypt and Sweden.

The cases are against people who have allegedly created websites to lure people into sharing their personal data, such as credit card numbers or bank account log-in information.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Microsoft Windows software

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...