نتایج جستجو برای: phishing attacks

تعداد نتایج: 58509  

Journal: :CoRR 2011
M. Tariq Banday Jameel A. Qadri

In today’s business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest attacks, DoS attacks, and other threats combine to attack businesses and customers. This paper is an attempt to review phishing – a constantly growing and evolving threat to Internet based comm...

2016
Abdul A. Orunsolu Adesina Simon Sodiya

Phishing attacks are becoming an everyday threat to the ever growing cyber community. Regrettably, most online users do not understand some of the simplest indicators of a typical phishing scam. In addition, the sophistication of some of the newest phishing defeat most of the current software-based countermeasure and anti-phishing education. In this work, a new paradigm-shift architecture is pr...

Journal: :International Journal of Computer Applications 2018

2007
Mohsen Sharifi Alireza Saberi Mojtaba Vahidi-Asl Mohammad Zoroufi

Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper proposes an Anti-Phishing Authentication (APA) technique to detect and prevent real-time phishing attacks. It uses 2-way authentication and zero-knowledge password proof. Users are recommended to customize their user in...

Journal: :CoRR 2014
Biju Issac R. Chiong Seibu Mary Jacob

One of the biggest problems with the Internet technology is the unwanted spam emails. The welldisguised phishing email comes in as part of the spam and makes its entry into one’s inbox quite frequently nowadays. While phishing is normally considered a consumer issue, the fraudulent tactics the phishers use are now intimidating the corporate sector as well. In this paper, we analyze the various ...

Journal: :International Journal of Security and Its Applications 2016

2007
Anders Persson Martin Boldt

Online banking and e-commerce applications have good protection against attacks directed direct towards their computer systems. This, the attacker has considered and instead use " social engineering " attacks, such as phishing to gain access to the information inside [1] [15] [20]. Phishing is a growing problem that many different companies are trying to develop a working protection against. Th...

2017
Qian Cui Guy-Vincent Jourdan Gregor von Bochmann Russell Couturier Iosif-Viorel Onut

The so-called “phishing” attacks are one of the important threats to individuals and corporations in today’s Internet. Combatting phishing is thus a top-priority, and has been the focus of much work, both on the academic and on the industry sides. In this paper, we look at this problem from a new angle. We have monitored a total of 19,066 phishing attacks over a period of ten months and found t...

2006
Madhusudhanan Chandrasekaran Krishnan Narayanan Shambhu Upadhyaya

Phishing attacks pose a serious threat to end-users and commercial institutions alike. Majority of the present day phishing attacks employ e-mail as their primary carrier, in order to allure unsuspecting victims to visit the masqueraded website. While the recent defense mechanisms focus on detection by validating the authenticity of the website, very few approaches have been proposed which conc...

Journal: :CoRR 2011
Beatrice Cynthia Dhinakaran Dhinaharan Nagamalai Jae-Kwang Lee

Spam messes up users inbox, consumes resources and spread attacks like DDoS, MiM, phishing etc. Phishing is a byproduct of email and causes financial loss to users and loss of reputation to financial institutions. In this paper we examine the characteristics of phishing and technology used by Phishers. In order to counter anti-phishing technology, phishers change their mode of operation; theref...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید