نتایج جستجو برای: phishing detection

تعداد نتایج: 567318  

2017

Mobile application phishing happens when a malicious mobile application masquerades as a legitimate one to steal user credentials. Personalized security indicators may help users to detect phishing attacks, but rely on the user’s alertness. Previous studies in the context of website phishing have shown that users tend to ignore personalized security indicators and fall victim to attacks despite...

2017
Marcus A. Butavicius Kathryn Parsons Malcolm Robert Pattinson Agata McCormac Dragana Calic Meredith Lillie

In a lab-based empirical study, we examined how individual differences and an aspect of national culture impacted on participants’ responses to phishing and spear-phishing emails. Results showed that the strongest predictor of the participants’ ability to detect these malicious emails was cultural orientation towards the needs of the individual rather than the needs of society. For both types o...

2014
Hao Jiang Joshua S. White Jeanna N. Matthews

Phishing website creators and anti-phishing defenders are in an arms race. Cloning a website is fairly easy and can be automated by any junior programmer. Attempting to recognize numerous phishing links posted in the wild e.g. on social media sites or in email is a constant game of escalation. Automated phishing website detection systems need both speed and accuracy to win. We present a new met...

2017
G. Fehringer P. A. Barraclough

Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low falsepositive rates, but blacklist approaches utilizes website URLs only. This study analyses and combines phishing emails and phishing web-forms in a single framework, which allows feature extraction and feature model construction. The outcome should classify between phishing, suspicious, legit...

Phishing is one of the luring techniques used to exploit personal information. A phishing webpage detection system (PWDS) extracts features to determine whether it is a phishing webpage or not. Selecting appropriate features improves the performance of PWDS. Performance criteria are detection accuracy and system response time. The major time consumed by PWDS arises from feature extraction that ...

Journal: :CoRR 2014
Mohammad S. Qaseem A. Govardhan

User ignorance towards the use of communication services like Instant Messengers, emails, websites, social networks etc. is becoming the biggest advantage for phishers. It is required to create technical awareness in users by educating them to create a phishing detection application which would generate phishing alerts for the user so that phishing messages are not ignored. The lack of basic se...

2009
Ieng-Fat Lam Wei-Cheng Xiao Szu-Chi Wang Kuan-Ta Chen

Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense of those detectors. We call this kind of countermeasure phishing page polymorphism. Polymorphic pages are visually similar to genuine pages they try to mimic, but they use different representation techniques. It incre...

Journal: :Human factors 2016
Casey Inez Canfield Baruch Fischhoff Alex Davis

OBJECTIVE We use signal detection theory to measure vulnerability to phishing attacks, including variation in performance across task conditions. BACKGROUND Phishing attacks are difficult to prevent with technology alone, as long as technology is operated by people. Those responsible for managing security risks must understand user decision making in order to create and evaluate potential sol...

2014
Shabin Blesson Beulah Shekar

Malware and phishing detection is one of the most fascinating topics in recent era because of the harm produced by them to the internet users. Phishing website detection can be said as new to the arena. Phishing websites are considered as one of the lethal weapon to embezzle one’s personal information and use it for the crackers benefits. In spite of the fact that malware samples and phishing w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید