نتایج جستجو برای: phishing attacks

تعداد نتایج: 58509  

Journal: :Journal of Management and Strategy 2014

2011
Ram B. Basnet Andrew H. Sung Quingzhong Liu

The World Wide Web has become the hotbed of a multi-billion dollar underground economy among cyber criminals whose victims range from individual Internet users to large corporations and even government organizations. As phishing attacks are increasingly being used by criminals to facilitate their cyber schemes, it is important to develop effective phishing detection tools. In this paper, we pro...

2005
Anthony Y. Fu Xiaotie Deng Wenyin Liu

We anticipate a potential phishing strategy by obfuscation of Web links using Internationalized Resource Identifier (IRI). In the IRI scheme, the glyphs of many characters look very similar while their Unicodes are different. Hence, certain different IRIs may show high similarity. The potential phishing attacks based on this strategy are very likely to happen in the near future with the boostin...

2012
Jianyi Zhang Chaohua Wu Dan Li Zhe Jia Xi Ouyang Yang Xin

Phishing has by far become the most dangerous form of fraud to hit online business. Due to the key role in accessing the Internet, web browsers are at a strategic position to offer the protection against the risks of phishing attacks. Varieties of security companies have proposed their browser-based antiphishing solutions to protect the end-use. In this paper, we used 3403 fresh phishing URLs a...

2017

Today, everything has been digitized and Banking is one of the sectors which faces online threats and Phishing is one of the threat. Phishing is an online uniqueness fraud, which intends to seize classified data mainly alias name, keys and online trading aspects from its sufferers. Primarily, an intruder cheats people to disclose sensible data by emailing a fraudulent broadcast to huge number o...

Journal: :EURASIP J. Information Security 2016
Ankit Kumar Jain B. B. Gupta

Most of the anti-phishing solutions are having two major limitations; the first is the need of a fast access time for a real-time environment and the second is the need of high detection rate. Black-list-based solutions have the fast access time but they suffer from the low detection rate while other solutions like visual similarity and machine learning suffer from the fast access time. In this...

2005
Rolf Oppliger Sebastian Gajek

Phishing and Web spoofing have proliferated and become a major nuisance on the Internet. The attacks are difficult to protect against, mainly because they target non-cryptographic components, such as the user or the user-browser interface. This means that cryptographic security protocols, such as the SSL/TLS protocol, do not provide a complete solution to tackle the attacks and must be compleme...

2006
Min Wu

The problem that this thesis concentrates on is phishing attacks. Phishing attacks use email messages and web sites designed to look as if they come from a known and legitimate organization, in order to deceive users into submitting their personal, financial, or computer account information online at those fake web sites. Phishing is a semantic attack. The fundamental problem of phishing is tha...

2011
Edwin Donald Frauenstein Rossouw von Solms

The objective of this paper is to report back on an organizational framework, which consisted of human, organization and technology (HOT) dimensions in holistically addressing aspects associated with phishing. Most anti-phishing literature studied either focused on technical controls or education in isolation however; education is core to all aspects in the above-mentioned framework. It is evid...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید