نتایج جستجو برای: phishing

تعداد نتایج: 1908  

2014
Shabin Blesson Beulah Shekar

Malware and phishing detection is one of the most fascinating topics in recent era because of the harm produced by them to the internet users. Phishing website detection can be said as new to the arena. Phishing websites are considered as one of the lethal weapon to embezzle one’s personal information and use it for the crackers benefits. In spite of the fact that malware samples and phishing w...

2007
Daisuke Miyamoto Hiroaki Hazeyama Youki Kadobayashi

In this paper, we propose an approach which improves the accuracy of detecting phishing sites by employing the AdaBoost algorithm. Although there are heuristics to detect phishing sites, existing anti-phishing tools still do not achieve high accuracy in detection. We hypothesize that the inaccuracy is caused by anti-phishing tools that can not use these heuristics appropriately. Our attempt is ...

Journal: :CoRR 2017
Nalin Asanka Gamagedara Arachchilage Mumtaz Abdul Hameed

Security exploits can include cyber threats such as computer programs that can disturb the normal behavior of computer systems (viruses), unsolicited e-mail (spam), malicious software (malware), monitoring software (spyware), attempting to make computer resources unavailable to their intended users (Distributed Denial-of-Service or DDoS attack), the social engineering, and online identity theft...

2011
Narasimha Shashidhar Lei Chen Sam Houston

Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. In this paper, we present a theoretical yet practical model to study this threat in a formal manner. While it is folklore knowledge that a successful phishing attack entails creating messages that are indistinguishable from the natural, expected messages by the intended victim, this concept has n...

2009
Kuan-Ta Chen Chun-Rong Huang

P hishing is a form of online identity theft associated with both social engineering and technical subterfuge. Specifically, phishers attempt to trick Internet users into revealing sensitive or private information, such as their bank account and credit-card numbers. Unwary users are often lured to browse counterfeit Web sites through spoofed email, and they might easily be convinced that fake p...

Journal: :Journal of Computer Security 2010
André Bergholz Jan De Beer Sebastian Glahn Marie-Francine Moens Gerhard Paass Siehyun Strobel

Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confidential information. Most phishing emails aim at withdrawing money from financial institutions or getting access to private information. Phishing has increased enormously over the last years and is a serious threat to glo...

Journal: :CoRR 2013
Tzipora Halevi Jim Lewis Nasir D. Memon

Phishing attacks have become an increasing threat to online users. Recent research has begun to focus on the factors that cause people to respond to them. Our study examines the correlation between the Big Five personality traits and email phishing response. We also examine how these factors affect users behavior on Facebook, including posting personal information and choosing Facebook privacy ...

Journal: :Informatica (Slovenia) 2013
Weifeng Zhang Hua Lu Baowen Xu Hongji Yang

Web phishing is becoming an increasingly severe security threat in the web domain. Effective and efficient phishing detection is very important for protecting web users from loss of sensitive private information and even personal properties. One of the keys of phishing detection is to efficiently search the legitimate web page library and to find those page that are the most similar to a suspic...

2010
Brad Wardman Gary Warner Heather McCalley Sarah Turner Anthony Skjellum

Phishing continues to grow as phishers discover new exploits and attack vectors for hosting malicious content; the traditional response using takedowns and blacklists does not appear to impede phishers significantly. A handful of law enforcement projects — for example the FBI's Digital PhishNet and the Internet Crime and Complaint Center (ic3.gov) — have demonstrated that they can collect phish...

2009
Ponnurangam Kumaraguru Lorrie Faith Cranor Laura Mather

This paper describes the design and implementation of the Anti-Phishing Working Group (APWG) anti-phishing landing page, a web page with a succinct anti-phishing training message designed to be displayed in place of a phishing website that has been taken down. The landing page is currently being used by financial institutions, phish site take-down vendors, government organizations and online me...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید