نتایج جستجو برای: phishing
تعداد نتایج: 1908 فیلتر نتایج به سال:
Phishing attacks continue to pose a major headache for defenders of computing systems, often forming the first step in a multistage attack. There have been great strides made in phishing detection, however, some insidious kinds of phishing messages appear to pass through filters by making seemingly simple structural and semantic changes to the messages. We tackle this problem in this paper, thr...
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper proposes an Anti-Phishing Authentication (APA) technique to detect and prevent real-time phishing attacks. It uses 2-way authentication and zero-knowledge password proof. Users are recommended to customize their user in...
Phishing is a threat that acquire sensitive information such as username, password etc through online. Phishing often takes place in email spoofing or instant messaging .Phishing email contains messages like ask the users to enter the personal information so that it is easy for hackers to hack the information. This paper presents an overview about various phishing attacks and various techniques...
Investigating Information Structure of Phishing Emails Based on Persuasive Communication Perspective
Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of ph...
This research studies the indirect financial impact of phishing announcements on firm value. Using about 3,000 phishing announcements, we showed that phishing has a significantly negative impact on firms regardless of their size. We also discovered that place of incorporation, type of ownership, industry, and time are significant factors exacerbating the impact. Our research findings may give s...
Phishing is an online fraudulent technique, which aims to steal sensitive information such as usernames, passwords and online banking details from its victims. To prevent this, anti-phishing education needs to be considered. This research focuses on examining the effectiveness of mobile game based learning compared to traditional online learning to thwart phishing threats. Therefore, a mobile g...
In spite of existence of many standard security mechanisms for ensuring secure eCommerce business, users still fall prey for online attacks. One such simple but powerful attack is ‘Phishing’. Phishing is the most alarming threat in the e-Commerce world and effective anti-phishing technique is the need of the hour. This paper focuses on a novel anti-phishing browser plug-in which uses informatio...
Phishing website creators and anti-phishing defenders are in an arms race. Cloning a website is fairly easy and can be automated by any junior programmer. Attempting to recognize numerous phishing links posted in the wild e.g. on social media sites or in email is a constant game of escalation. Automated phishing website detection systems need both speed and accuracy to win. We present a new met...
Phishing has been a growing information security risk for online consumers. However, various levels of uncertainties exist in consumer knowledge and evaluation of online phishing risks. Drawing upon research in decision under risks and uncertainties, this study categorizes an online consumer’s knowledge of phishing risks as falling under one of four uncertainty states: known certainty, known un...
Phishing websites, fraudulent sites that impersonate a trusted third party to gain access to private data, continue to cost Internet users over a billion dollars each year. In this paper, we describe the design and performance characteristics of a scalable machine learning classifier we developed to detect phishing websites. We use this classifier to maintain Google’s phishing blacklist automat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید