NEW YORK — The instant connectivity of e-mail on a mobile device can be a blessing and a curse, especially when it comes to visiting phony websites.

Trusteer recently gained access to the log files of several web servers that were hosting phishing websites. The company said its analysis of the log files provided visibility into how many users accessed the websites, when they visited them, whether they submitted their login information, and what devices they used to access the website.

Subscribe Now

Authoritative analysis and perspective for every segment of the credit union industry

14-Day Free Trial

No credit card required. Complete access to articles, breaking news and industry data.