[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Phishing ExposedNovember 2005
Publisher:
  • Syngress Publishing
ISBN:978-1-59749-030-6
Published:01 November 2005
Skip Bibliometrics Section
Reflects downloads up to 05 Jan 2025Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Lin T, Capecci D, Ellis D, Rocha H, Dommaraju S, Oliveira D and Ebner N (2019). Susceptibility to Spear-Phishing Emails, ACM Transactions on Computer-Human Interaction, 26:5, (1-28), Online publication date: 31-Oct-2019.
  2. Gupta B, Tewari A, Jain A and Agrawal D (2017). Fighting against phishing attacks, Neural Computing and Applications, 28:12, (3629-3654), Online publication date: 1-Dec-2017.
  3. Jain A, Gupta B and Khan M (2017). Phishing Detection, Security and Communication Networks, 2017, Online publication date: 1-Jan-2017.
  4. Verma R and Hossain N Semantic Feature Selection for Text with Application to Phishing Email Detection Information Security and Cryptology -- ICISC 2013, (455-468)
  5. Arachchilage N and Love S (2013). A game design framework for avoiding phishing attacks, Computers in Human Behavior, 29:3, (706-714), Online publication date: 1-May-2013.
  6. ACM
    Chhabra S, Aggarwal A, Benevenuto F and Kumaraguru P Phi.sh/$oCiaL Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, (92-101)
  7. ACM
    Kumaraguru P, Sheng S, Acquisti A, Cranor L and Hong J (2010). Teaching Johnny not to fall for phish, ACM Transactions on Internet Technology, 10:2, (1-31), Online publication date: 1-May-2010.
  8. Bose I and Leung A (2008). Assessing anti-phishing preparedness, Decision Support Systems, 45:4, (897-912), Online publication date: 1-Nov-2008.
  9. ACM
    Abu-Nimeh S, Nappa D, Wang X and Nair S A comparison of machine learning techniques for phishing detection Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, (60-69)
  10. ACM
    Kumaraguru P, Rhee Y, Acquisti A, Cranor L, Hong J and Nunge E Protecting people from phishing Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (905-914)
  11. ACM
    Kumaraguru P, Acquisti A and Cranor L Trust modelling for online transactions Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-9)
Contributors

Reviews

Radu State

On a daily basis, I receive emails asking me to update my account information on some very popular Web sites, like Amazon or Ebay. Basic security awareness will probably prevent a cautious user from being lured into disclosing sensitive account information to the originators of the email, but most Internet users lack this basic security knowledge, and will become victims of a phishing attack. From a technical point of view, I was always curious to learn how these attacks are carried out. The principle is very simple in theory: attackers perform massive email address harvesting, and obtain a large population of potential victims. Next, these victims must be lured into disclosing sensitive information to visited hostile Web sites. This process must be done transparently, so that the victims are confident that they are communicating with the legitimate Web sites. In practice, successful phishing attacks are based on a mixture of inherent and structural Internet protocol weaknesses, and a collection of Web programming hacks. Some recent phishing schemes are extremely well done, and show that ongoing work and progress has been made in the underground hacking and criminal communities. This is a remarkable book for its technical content and high-quality presentation. It starts with a general introduction to phishing, and next goes into the technical details of how phishing can be done. Starting with the second chapter, the book gets highly technical: it describes how to set up a phishing server, and how to generate spoofed email messages that look legitimate, but will in fact detour the victim to disclose important credentials. Some attack vectors are common to both spamming and phishing. In both cases, unwanted messages have to be read by Internet users, and therefore some of the tricks used are common to phishers and spammers. There are, however, some major differences: spammers do not need to impersonate someone else, while phishers must provide a look and feel identical to the legitimate service. Successful phishers commonly exploit security holes in Web applications. The fourth and fifth chapters essentially constitute the core of the book, and provide an extremely rich and comprehensive overview of how cross-site scripting, browser exploits, hypertext transfer protocol (HTTP) manipulation, and Dynamic Hypertext Markup Language (DHTML) are currently used by malicious attackers. The author illustrates this part of the book with many real-world examples. Some of the described cases are very surprising, since they concern well-known sites, where such vulnerabilities might have impacted a large user population. Chapter 6, about voice over Internet protocol (VoIP) phishing, is a must-read. This is the first time that this issue is addressed in a technical manner in a book, and, due to the recent take-off in the VoIP business, this issue will be of major interest in the near future. I recommend this book to all readers interested in the technical details of phishing attacks. A large category of readers will benefit from it: Web developers and webmasters will get valuable information on how to secure their applications and Web sites, and readers with average technical knowledge will learn the essential background information required to discover a phishing attack and unveil such a scam. To conclude, this excellent and timely book is more than welcome and is a must-read for the target audience. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations