نتایج جستجو برای: phishing

تعداد نتایج: 1908  

2014
Namrata Singh Nihar Ranjan Roy

Phishing is a significant problem that tricks unsuspecting users into revealing private information involving fraudulent email and websites. This causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based on phishing blacklists and phishing properties. We used some fresh phish from PhishTank that were recently added to test that it can be ...

2017
Bonnie Anderson Anthony Vance David Eargle Anderson Bonnie Brinton

Phishing has become a major attack vector for hackers and cost victims $687 million in the first half of 2012 alone. Additionally, despite technical solutions to defend against this threat, reports show that phishing attacks are increasing. There is therefore a pressing need to understand why users continue to fall victim to phishing, and how such attacks can be prevented. In this researchin-pr...

Journal: :J. Internet Serv. Inf. Secur. 2014
Ram B. Basnet Andrew H. Sung

Phishing has become a lucrative business for cyber criminals whose victims range from end users to large corporations and government organizations. Though Internet users are generally becoming more aware of phishing websites, cyber scammers come up with novel schemes that circumvent phishing filters and often succeed in fooling even savvy users. Recent studies to detect phishing and malicious w...

2013
Daisuke Miyamoto Toshiyuki Miyachi Yuzo Taenaka Hiroaki Hazeyama

This paper introduces PhishCage, an experimental infrastructure for phishing detection systems. Due to the short life time of phishing sites, comparative study of effectiveness, especially universality, among the detection systems is difficult. Our key idea is developing a testbed in which preserved phishing sites can be browsed as if they existed in the wild. According to our survey for phishi...

2005
Yingjie Fu Xiaotie Deng Liu Wenyin

We anticipate a potential phishing strategy by obfuscation of Web links using Internationalized Resource Identifier (IRI). In the IRI scheme, the glyphs of many characters look very similar while their Unicodes are different. Hence, certain different IRIs may show high similarity. Therefore, it is quite difficult for normal Web users to distinguish them. The potential phishing attacks based on ...

2009
Paul Knickerbocker Dongting Yu Jun Li

Conventional techniques for combating phishing have focused primarily on detecting phishing web sites and preventing users from revealing their passwords to such sites. This passive form of defense is by its nature incomplete and does nothing to protect users that do reveal their passwords. Combating the phishing threat requires more than simple avoidance—it requires a more active approach to d...

Journal: :CoRR 2011
M. Tariq Banday Jameel A. Qadri

In today’s business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest attacks, DoS attacks, and other threats combine to attack businesses and customers. This paper is an attempt to review phishing – a constantly growing and evolving threat to Internet based comm...

Journal: :CoRR 2012
Wajeb Gharibi

Phishing (password + fishing) is a form of cyber crime based on social engineering and site spoofing techniques. The name of ‘phishing’ is a conscious misspelling of the word 'fishing' and involves stealing confidential data from a user’s computer and subsequently using the data to steal the user’s money. In this paper, we study, discuss and propose the phishing attack stages and types, technol...

2015
Leah Zhang-Kennedy Elias Fares Sonia Chiasson Robert Biddle

Phishing is a significant type of internet crime that tricks users into giving up their personal and financial information. To combat phishing, browser manufacturers, software vendors, and organizations have compiled repositories of phishing URLs (blacklists). These lists enable the analysis of reported phishing attacks to be shared among antiphishing communities to gain awareness of evolving p...

2010
Marthie Grobler

Phishing is an attempt by a third party to solicit confidential information from an individual, group or organization. Phishers attempt to trick users into disclosing personal data, such as credit card numbers, online banking credentials and other sensitive information, which they may then use to commit fraudulent acts. There has been an increase in attack diversity and technical sophistication...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید