Study on Cyber-Attacks Based on E-mails
Downloads
A particularly dangerous and now common type of spam known as "Phishing” attempts to trick recipients into revealing personal and sensitive data, such as passwords, login ID’s, financial information or social security numbers. Recipients are directed to counterfeit and fraudulent websites that are exact duplicates of well-known and respected companies such as eBay, PayPal or large banking institutions and prompted to enter account information. This white paper addresses current issues associated with phishing scams and argues the most probable and likely direction phishing scams will follow in the future. Recommended safe user guidelines are included to help protect users from both current and future phishing attacks.
Downloads
F. Gens. (2009, Feb.). “New IDC IT Cloud Services Survey: Top Benefits and Challenges”, IDC eXchange || http://blogs.idc.com/ie/?p=730 www.zdnet.com
M. Klems, A. Lenk, J. Nimis, T. Sandholm and S. Tai. “What’s Inside the Cloud? An Architectural Map of the Cloud Landscape.” IEEE Xplore, pp 23-31, Jun. 2009. || http://www.di.ufpe.br/~redis/intranet/bibliography/middleware/lenk-what-2009.pdf
S. Ramgovind, M. M. Eloff, E. Smith. “The Management of Security in Cloud Computing” In PROC 2010 IEEE International Conference on Cloud Computing 2010
Gilbert Wondracek, Thorsten Holz, Engin Kirda and Christopher Kruegel, “Practical Attack to De-anonymize Social Network Users”, IEEE Symposium on Security and Privacy, 2010, pp. 223-238
www.greenviewdata.com