نتایج جستجو برای: phishing attacks

تعداد نتایج: 58509  

2009
Mandy Holbrook Julie Downs Lorrie Cranor

Phishing attacks, in which scammers send emails and other messages to con victims into providing their login credentials and personal information, snare millions of victims each year [43]. A variety of efforts aim to combat phishing through law enforcement, automated detection, and end-user education. Researchers have studied why people fall for phishing attacks; however, little research has be...

2009
Kuan-Ta Chen Jau-Yuan Chen Chun-Rong Huang Chu-Song Chen

Phishing is a form of online identity theft associated with both social engineering and technical subterfuge. As such, it has become a major threat to information security and personal privacy. According to Gartner Inc., in 2007, more than $3.2 billion was lost due to phishing attacks in the US, and 3.6 million people lost money in such attacks. In this article, we present an effective image-ba...

2016
Priyanka Joshi

With an upsurge in the use of internet, there are various attacks being launched every day. These attacks target the vulnerabilities of various computer resources, such as, the operating system, web browsers, toolbars, etc. along with the susceptibility of the users due to lack of awareness about the possible scams. The existing solutions suffer various drawbacks. The website phishing solutions...

2012
Gundeep Singh Bindra

Statistics indicate that more than 1000 phishing attacks are launched every month. With 57 million people hit by the fraud so far in America alone, how do we combat phishing?This publication aims to discuss strategies in the war against Phishing. This study is an examination of the analysis and critique found in the ways adopted at various levels to counter the crescendo of phishing attacks and...

2017
R. Aravindhan R. Shanmugalakshmi

Phishing is aptly defined as an endeavour to grab users’ financial and personal information without their knowledge. The information stolen here are their credit card numbers, passwords and social security. All these are achieved through the execution of messaging services and e-mail via electronic communication. The main agenda in proposing this original methodology is for two executions. One ...

2013
Gaurav Kumar Tak Gaurav Ojha

The increasing use of internet all over the world, be it in households or in corporate firms, has led to an unprecedented rise in cyber-crimes. Amongst these the major chunk consists of Internet attacks which are the most popular and common attacks are carried over the internet. Generally phishing attacks, SSL attacks and some other hacking attacks are kept into this category. Security against ...

2016
V. Suganya

Phishing is a threat that acquire sensitive information such as username, password etc through online. Phishing often takes place in email spoofing or instant messaging .Phishing email contains messages like ask the users to enter the personal information so that it is easy for hackers to hack the information. This paper presents an overview about various phishing attacks and various techniques...

2006
Sebastian Gajek Ahmad-Reza Sadeghi Christian Stüble Marcel Winandy Horst Görtz

Identity theft through phishing attacks has fostered to a major concern of Internet users. Classical phishing attacks aim at luring the user to a faked web site to disclose personal information. Various solutions have been proposed against this kind of attack. However, these solutions can hardly counter the new generation of sophisticated malware phishing attacks designed to target certain serv...

Journal: :I. J. Network Security 2010
Antonio San Martino Xavier Perramon

This paper presents the results of a study performed over phishing threats and vulnerabilities present in nowadays authentication environments. The main goal of this paper is to present our solution, the anti-phishing model which can be applied to any web environment, and not just to e-banking or the financial sector, without limitations nor additional requirements. We start presenting a brief ...

Journal: :International Journal of Computer Applications 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید