Building Anti-Phishing Browser Plug-Ins: An Experience Report
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
A framework for detection and measurement of phishing attacks
Proceedings of the 2007 ACM workshop on Recurring malcode
Browser-Side Countermeasures for Deceptive Phishing Attack
IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 01
Countermeasure Techniques for Deceptive Phishing Attack
NISS '09 Proceedings of the 2009 International Conference on New Trends in Information and Service Science
Predicting Phishing Websites Using Classification Mining Techniques with Experimental Case Studies
ITNG '10 Proceedings of the 2010 Seventh International Conference on Information Technology: New Generations
Towards preventing QR code based attacks on android phone using security warnings
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Hi-index | 0.00 |
Phishing is form of identity theft that uses the social engineering techniques and sophisticated attack vectors to harvest financial information from unsuspecting consumers. It is a kind of attack in which phishers use spoofed emails and fraudulent web sites to trick people into giving up personal information. Victims perceive these emails as trusted, while in reality they are the work of phishers interested in identity theft. Web site phishing attacks usually start with an e-mail that arrives in the victim's mailbox pretending to be a legitimate and known entity. Usually, the mail claims some urgent steps to be taken by the user to avoid blocking of user account and direct him to a web page asking him to enter private information. But the web page is not legitimate and has no association with the organization it claims to be. Hence, the number of phishing fraud is continuing to grow, and the costs of the damages caused are increasing day by day. Therefore, there is the urgent need for anti-phishing solutions and recently have been identified, a number of solutions to mitigate phishing attacks have been proposed.