This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Compleat Story of Phish
Jan.-Feb. 2013 (vol. 17 no. 1)
pp. 87-91
Hilarie Orman, Purple Streak
Deceptive email that leads unwary users to disclose sensitive information on fake websites is the most common form of malware seen by today's users. The technology behind these attacks uses the Internet's weak notion of "place" and the increasing use of websites for financial transactions. Users can protect themselves through precautionary measures, and experts learn to accurately identify malicious email.
Index Terms:
Electronic mail,Internet,IP networks,Malware,Browsers,Computer security,security,phishing,malware
Citation:
Hilarie Orman, "The Compleat Story of Phish," IEEE Internet Computing, vol. 17, no. 1, pp. 87-91, Jan.-Feb. 2013, doi:10.1109/MIC.2013.16
Usage of this product signifies your acceptance of the Terms of Use.