Issue No. 01 - Jan.-Feb. (2013 vol. 17)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MIC.2013.16
Hilarie Orman , Purple Streak
Deceptive email that leads unwary users to disclose sensitive information on fake websites is the most common form of malware seen by today's users. The technology behind these attacks uses the Internet's weak notion of "place" and the increasing use of websites for financial transactions. Users can protect themselves through precautionary measures, and experts learn to accurately identify malicious email.
Electronic mail, Internet, IP networks, Malware, Browsers, Computer security, security, phishing, malware
H. Orman, "The Compleat Story of Phish," in IEEE Internet Computing, vol. 17, no. , pp. 87-91, 2013.