The Community for Technology Leaders
Green Image
Issue No. 01 - Jan.-Feb. (2013 vol. 17)
ISSN: 1089-7801
pp: 87-91
Hilarie Orman , Purple Streak
ABSTRACT
Deceptive email that leads unwary users to disclose sensitive information on fake websites is the most common form of malware seen by today's users. The technology behind these attacks uses the Internet's weak notion of "place" and the increasing use of websites for financial transactions. Users can protect themselves through precautionary measures, and experts learn to accurately identify malicious email.
INDEX TERMS
Electronic mail, Internet, IP networks, Malware, Browsers, Computer security, security, phishing, malware
CITATION
Hilarie Orman, "The Compleat Story of Phish", IEEE Internet Computing, vol. 17, no. , pp. 87-91, Jan.-Feb. 2013, doi:10.1109/MIC.2013.16
107 ms
(Ver 3.1 (10032016))