Analyzing Various Methods of Phishing Attacks
Downloads
Phishing is a criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. This paper analysis various methods of the phishing attacks and present several techniques to combat phishing, including legislation and technology created specifically to protect against phishing.
Downloads
Jason Milletary, “Technical Trends in Phishing Attacks”, www.cert.org/archive/pdf/ Phishing_trends.pdf.
Broersma, Matthew. “Trojan Targets Microsoft's AntiSpyware Beta”, http://www.eweek.com/article2/0,1759,1763560,00.asp.
Gabrilovich, Evgeniy & Gontmakher, Alex. “The Homograph Attack”, Communications of the ACM, http://www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf.
Sophos, “Do-it-yourself phishing kits found on the internet, reveals Sophos”, http://www.sophos.com/spaminfo/articles/diyphishing.html.
Roberts, Paul. “More Scam Artists Go Phishing”, http://www.pcworld. com/news/article/0,aid,116330,00.asp.
Dormann, Will. “Microsoft Internet Explorer DHTML Editing ActiveX control contains a cross-domain vulnerability”, http://www.kb.cert.org/vuls/id/356600.




