The Community for Technology Leaders
RSS Icon
Issue No.01 - Jan.-Feb. (2013 vol.17)
pp: 87-91
Hilarie Orman , Purple Streak
Deceptive email that leads unwary users to disclose sensitive information on fake websites is the most common form of malware seen by today's users. The technology behind these attacks uses the Internet's weak notion of "place" and the increasing use of websites for financial transactions. Users can protect themselves through precautionary measures, and experts learn to accurately identify malicious email.
Electronic mail, Internet, IP networks, Malware, Browsers, Computer security, security, phishing, malware
Hilarie Orman, "The Compleat Story of Phish", IEEE Internet Computing, vol.17, no. 1, pp. 87-91, Jan.-Feb. 2013, doi:10.1109/MIC.2013.16
1. N. Provos, “Safe Browsing — Protecting Web Users for 5 Years and Counting,” Google Online Security blog, 19 June 2012; 2012/06safe-browsing-protecting-web-users-for.html .
2. M. Felegyhazi, C. Kreibich, and V. Paxson, “On the Potential of Proactive Domain Blacklisting,” Proc. 3rd Usenix Conf. Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, Usenix Assoc., 2010, pp. 6–6.
3. S. Sheng et al., “Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions,” Proc. ACM SIGCHI Conf. Human Factors in Computing Systems, ACM, 2010, pp. 373–382.
4. Global Phishing Survey: Domain Name Use and Trends in 1H2012, tech. report, Anti-Phishing Working Group, 23 Oct. 2012.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool