DocumentCode :
19269
Title :
The Compleat Story of Phish
Author :
Orman, Hilarie
Volume :
17
Issue :
1
fYear :
2013
fDate :
Jan.-Feb. 2013
Firstpage :
87
Lastpage :
91
Abstract :
Deceptive email that leads unwary users to disclose sensitive information on fake websites is the most common form of malware seen by today\´s users. The technology behind these attacks uses the Internet\´s weak notion of "place" and the increasing use of websites for financial transactions. Users can protect themselves through precautionary measures, and experts learn to accurately identify malicious email.
Keywords :
Internet; Web sites; finance; invasive software; unsolicited e-mail; Internet; Websites; deceptive email; financial transactions; malicious email; malware; phish; sensitive information; Browsers; Computer security; Electronic mail; IP networks; Internet; Malware; malware; phishing; security;
fLanguage :
English
Journal_Title :
Internet Computing, IEEE
Publisher :
ieee
ISSN :
1089-7801
Type :
jour
DOI :
10.1109/MIC.2013.16
Filename :
6415920
Link To Document :
بازگشت