-
3
-
-
35348877312
-
-
Syngress Publishing, Inc
-
L. James, Phishing Exposed. Syngress Publishing, Inc., 2005.
-
(2005)
Phishing Exposed
-
-
James, L.1
-
5
-
-
72449198352
-
-
Imperva, Inc, Online, Available
-
Imperva, Inc., "Securesphere defense note: Phishing and cross-site scripting," 2004. [Online]. Available: http://www.securitytechnet.com/ resource/rsc-center2/vendor-wp/imperva/20050606Imperva-SecureSphere-Defense- Note-Phishing.pdf
-
(2004)
Securesphere defense note: Phishing and cross-site scripting
-
-
-
6
-
-
84862210539
-
-
Online, Available
-
Nexus, "Applying XSS to phishing attacks," 2007. [Online]. Available: http://www.playhack.net/view.php?type=1&id=20
-
(2007)
Applying XSS to phishing attacks
-
-
Nexus1
-
7
-
-
72449165279
-
-
J. Yaneza, Spy-phishing: A new breed of blended threats, in Proc. Virus Bulletin Conference 2006, 2006. [Online]. Available: http://www.trendmicro.com/NR/rdonlyres/AC48648F-50D0-49F5-8438-7AEE516C501E/ 21322/spyphishing-102006.pdf
-
J. Yaneza, "Spy-phishing: A new breed of blended threats," in Proc. Virus Bulletin Conference 2006, 2006. [Online]. Available: http://www.trendmicro.com/NR/rdonlyres/AC48648F-50D0-49F5-8438-7AEE516C501E/ 21322/spyphishing-102006.pdf
-
-
-
-
9
-
-
38149086751
-
Drive-by pharm-ing
-
Information and Communications Security Proc. ICICS'2007, Springer
-
S. Stamm, Z. Ramzan, and M. Jakobsson, "Drive-by pharm-ing," in Information and Communications Security (Proc. ICICS'2007), ser. Lecture Notes in Computer Science, vol. 4861. Springer, 2008, pp. 495-506.
-
(2008)
ser. Lecture Notes in Computer Science
, vol.4861
, pp. 495-506
-
-
Stamm, S.1
Ramzan, Z.2
Jakobsson, M.3
-
10
-
-
72449143987
-
-
US Office of the Comptroller of the Currency, Online, Available
-
US Office of the Comptroller of the Currency, "Money laundering: A banker's guide to avoiding problems," 2002. [Online]. Available: http://www.comptrollerofthecurrency.gov/moneylaundering2002.pdf
-
(2002)
Money laundering: A banker's guide to avoiding problems
-
-
-
11
-
-
60649111418
-
Delayed password disclosure
-
M. Jakobsson and S. Myers, "Delayed password disclosure," ACM SIGACT News, vol. 38, no. 3, pp. 56-75, 2007.
-
(2007)
ACM SIGACT News
, vol.38
, Issue.3
, pp. 56-75
-
-
Jakobsson, M.1
Myers, S.2
-
13
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
ACM
-
M. Wu, R. C. Miller, and S. L. Garfinkel, "Do security toolbars actually prevent phishing attacks?" in Proc. CHI'2006. ACM, 2006, pp. 601-610.
-
(2006)
Proc. CHI'2006
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
14
-
-
33745816410
-
Why phishing works
-
ACM
-
R. Dhamija, J. D. Tygar, and M. Hearst, "Why phishing works," in Proc. CHI'2006. ACM, 2006, pp. 581-590.
-
(2006)
Proc. CHI'2006
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
15
-
-
77953890234
-
Password rescue: A new approach to phishing prevention
-
D. Florêncio and C. Herley, "Password rescue: A new approach to phishing prevention," in Proc. USENIX HotSec'2006, 2006, pp. 7-11.
-
(2006)
Proc. USENIX HotSec'2006
, pp. 7-11
-
-
Florêncio, D.1
Herley, C.2
-
16
-
-
67249096586
-
The consequence of non-cooperation in the fight against phishing
-
IEEE Computer Society
-
T. Moore and R. Clayton, "The consequence of non-cooperation in the fight against phishing," in Proc. APWG eCRS'2008. IEEE Computer Society, 2008.
-
(2008)
Proc. APWG eCRS'2008
-
-
Moore, T.1
Clayton, R.2
-
17
-
-
84863469085
-
Stronger password authentication using browser extensions
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell, "Stronger password authentication using browser extensions," in Proc. USENIX Security'2005, 2005, pp. 17-31.
-
(2005)
Proc. USENIX Security'2005
, pp. 17-31
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
19
-
-
70349653942
-
QR-TAN: Secure mobile transaction authentication
-
IEEE Computer Society
-
G. Starnberger, L. Froihofer, and K. M. Goeschka, "QR-TAN: Secure mobile transaction authentication," in Proc. ARES'2009. IEEE Computer Society, 2009, pp. 578-583.
-
(2009)
Proc. ARES'2009
, pp. 578-583
-
-
Starnberger, G.1
Froihofer, L.2
Goeschka, K.M.3
-
20
-
-
72449127918
-
-
Online, Available
-
Postbank, "mTAN now free for all customers," 2008. [Online]. Available: http://www.postbank.com/pbcom-ag-home/pbcom-pr-press/pbcom-pr-press- archives/pbcom-pr-press-archives-2008/pbcom-pr-pm1063-19-05-08.html
-
(2008)
mTAN now free for all customers
-
-
-
21
-
-
72449200478
-
-
Irish Times, Suspended term for €12,000 bank 'phishing' scam, 2009. [Online]. Available: http://www.irishtimes.com/newspaper/ ireland/2009/0214/1233867937480.html
-
Irish Times, "Suspended term for €12,000 bank 'phishing' scam," 2009. [Online]. Available: http://www.irishtimes.com/newspaper/ ireland/2009/0214/1233867937480.html
-
-
-
-
22
-
-
67650684865
-
Plugging the phishing hole: Legislation versus technology
-
Online, Available
-
R. L. B. Stevenson, "Plugging the phishing hole: Legislation versus technology," Duke Law & Technology Review, vol. 2005, no. 0006, 2005. [Online]. Available: http://www.law.duke.edu/journals/dltr/articles/ 2005dltr0006.html
-
(2005)
Duke Law & Technology Review
, vol.2005
, Issue.6
-
-
Stevenson, R.L.B.1
-
23
-
-
72449173240
-
INTERNET FRAUD: Preventing and responding to phishing and spoofing scams
-
D. Whitlock, "INTERNET FRAUD: Preventing and responding to phishing and spoofing scams," New Hampshire Bar J., vol. 42, no. 2, pp. 30-33, 2008.
-
(2008)
New Hampshire Bar J
, vol.42
, Issue.2
, pp. 30-33
-
-
Whitlock, D.1
-
25
-
-
72449176235
-
-
Institut Euréacom EURECOM, Sophia Antipolis, France, Research Report RR-03-081, Online, Available
-
F. Pouget, M. Dacier, and H. Debar, "Honeypot, honeynet, honeytoken: Terminological issues," Institut Euréacom (EURECOM), Sophia Antipolis, France, Research Report RR-03-081, 2003. [Online]. Available: http://www.eurecom.fr/util/publidownload.fr.htm?id=1275
-
(2003)
Honeypot, honeynet, honeytoken: Terminological issues
-
-
Pouget, F.1
Dacier, M.2
Debar, H.3
-
26
-
-
33845926633
-
PHONEY: Mimicking user response to detect phishing attacks
-
IEEE Computer Society
-
M. Chandrasekaran, R. Chinchani, and S. Upadhyaya, "PHONEY: Mimicking user response to detect phishing attacks," in Proc. WoWMoM'2006. IEEE Computer Society, 2006, pp. 668-672.
-
(2006)
Proc. WoWMoM'2006
, pp. 668-672
-
-
Chandrasekaran, M.1
Chinchani, R.2
Upadhyaya, S.3
-
27
-
-
39749133014
-
Phighting the phisher: Using web bugs and honeytokens to investigate the source of phishing attacks
-
IEEE Computer Society
-
C. M. McRae and R. B. Vaughn, "Phighting the phisher: Using web bugs and honeytokens to investigate the source of phishing attacks," in Proc. HICSS'2007. IEEE Computer Society, 2007, p. 270c.
-
(2007)
Proc. HICSS'2007
-
-
McRae, C.M.1
Vaughn, R.B.2
-
28
-
-
60649094724
-
Anti-phishing in offense and defense
-
IEEE Computer Society
-
C. Yue and H. Wang, "Anti-phishing in offense and defense," in Proc. ACSAC2008. IEEE Computer Society, 2008, pp. 345-354.
-
(2008)
Proc. ACSAC2008
, pp. 345-354
-
-
Yue, C.1
Wang, H.2
-
29
-
-
35348895913
-
Phishing phishers - observing and tracing organized cybercrime
-
IEEE Computer Society
-
D. Birk, S. Gajek, F Grobert, and A.-R. Sadeghi, "Phishing phishers - observing and tracing organized cybercrime," in Proc. ICIMP'2007. IEEE Computer Society, 2007.
-
(2007)
Proc. ICIMP'2007
-
-
Birk, D.1
Gajek, S.2
Grobert, F.3
Sadeghi, A.-R.4
-
30
-
-
45949097266
-
A forensic framework for tracing phishers
-
The Future of Identity in the Information Society, Springer
-
S. Gajek and A. Sadeghi, "A forensic framework for tracing phishers," in The Future of Identity in the Information Society, ser. IFIP International Federation for Information Processing, vol. 262. Springer, 2008, pp. 23-35.
-
(2008)
ser. IFIP International Federation for Information Processing
, vol.262
, pp. 23-35
-
-
Gajek, S.1
Sadeghi, A.2
-
31
-
-
72449201401
-
Server load balancing architectures
-
Online, Available
-
G. Roth, "Server load balancing architectures, Part 1: Transport-level load balancing," 2008. [Online]. Available: http://www.javaworld.com/javaworld/jw-10-2008/jw-10-load-balancing-1.html
-
(2008)
Transport-level load balancing
, Issue.PART 1
-
-
Roth, G.1
-
32
-
-
84975742583
-
Server load balancing architectures
-
Online, Available
-
-, "Server load balancing architectures, Part 2: Application-level load balancing," 2008. [Online]. Available: http://www.javaworld.com/ javaworld/jw-10-2008/jw-10-load-balancing-2.html
-
(2008)
Application-level load balancing
, Issue.PART 2
-
-
Roth, G.1
-
33
-
-
48249109486
-
Protecting financial institutions from brute-force attacks
-
Proc. IFIP SEC2008, Springer
-
C. Herley and D. Florêncio, "Protecting financial institutions from brute-force attacks," in Proc. IFIP SEC2008, ser. IFIP International Federation for Information Processing, vol. 278. Springer, 2008, pp. 681-685.
-
(2008)
ser. IFIP International Federation for Information Processing
, vol.278
, pp. 681-685
-
-
Herley, C.1
Florêncio, D.2
-
34
-
-
72449146604
-
-
RSA Security Inc, Online, Available
-
SM: Advanced external threats protection service," 2008. [Online]. Available: http://www.rsa.com/products/consumer/datasheets/9933FRAGOV-DS-1208.pdf
-
(2008)
SM: Advanced external threats protection service
-
-
-
36
-
-
24644432751
-
-
Online, Available
-
R. M. Smith, "The web bug FAQ," 1999. [Online]. Available: http://w2.eff.org/Privacy/Marketing/web-bug.html
-
(1999)
The web bug FAQ
-
-
Smith, R.M.1
-
37
-
-
2942728016
-
Telling humans and computers apart automatically
-
L. von Ahn, M. Blum, and J. Langford, "Telling humans and computers apart automatically," Comm. ACM, vol. 47, no. 2, pp. 57-60, 2004.
-
(2004)
Comm. ACM
, vol.47
, Issue.2
, pp. 57-60
-
-
von Ahn, L.1
Blum, M.2
Langford, J.3
-
38
-
-
0041431049
-
Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA
-
IEEE Computer Society
-
G. Mori and J. Malik, "Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA," in Proc. CVPR'2003, vol. 1. IEEE Computer Society, 2003, pp. 134-141.
-
(2003)
Proc. CVPR'2003
, vol.1
, pp. 134-141
-
-
Mori, G.1
Malik, J.2
-
39
-
-
48649084325
-
Breaking visual CAPTCHAs with naïve pattern recognition algorithms
-
IEEE Computer Society
-
J. Yan and A. S. E. Ahmad, "Breaking visual CAPTCHAs with naïve pattern recognition algorithms," in Proc. ACSAC'2007. IEEE Computer Society, 2007, pp. 279-291.
-
(2007)
Proc. ACSAC'2007
, pp. 279-291
-
-
Yan, J.1
Ahmad, A.S.E.2
-
40
-
-
66249097513
-
A low-cost attack on a Microsoft CAPTCHA
-
-, "A low-cost attack on a Microsoft CAPTCHA," in Proc. ACM CCS'2008, 2008, pp. 543-554.
-
(2008)
Proc. ACM CCS'2008
, pp. 543-554
-
-
Yan, J.1
Ahmad, A.S.E.2
-
42
-
-
84959317935
-
aiCaptcha: Using AI to beat CAPTCHA and post comment spam
-
Online, Available
-
C. Chesnut, "aiCaptcha: Using AI to beat CAPTCHA and post comment spam," 2005. [Online]. Available: http://www.brains-n-brawn.com/aiCaptcha
-
(2005)
-
-
Chesnut, C.1
-
43
-
-
72449175086
-
PC stripper helps spam to spread,
-
Online, Available
-
BBC News, "PC stripper helps spam to spread," 2007. [Online]. Available: http://news.bbc.co.uk/2/hi/technology/7067962.stm
-
(2007)
BBC News
-
-
-
44
-
-
77953898602
-
Examining the impact of website take-down on phishing
-
ACM
-
T. Moore and R. Clayton, "Examining the impact of website take-down on phishing," in Proc. APWG eCRS'2007. ACM, 2007, pp. 1-13.
-
(2007)
Proc. APWG eCRS'2007
, pp. 1-13
-
-
Moore, T.1
Clayton, R.2
-
45
-
-
72449143000
-
Outsourcing information technology and the insider threat
-
Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Air University, USA, Online, Available
-
V. L. Caruso, "Outsourcing information technology and the insider threat," AFIT/GIR/ENG/03-01, Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Air University, USA, 2003. [Online]. Available: http://handle.dtic.mil/100.2/ADA415113
-
(2003)
AFIT/GIR/ENG/03-01
-
-
Caruso, V.L.1
-
46
-
-
72449186916
-
-
IT-Online, World-first SMS banking scam exposes weaknesses, Web page, July 2009. [Online]. Available: http://www.it-online.co.za/content/ view/1092105/142/
-
IT-Online, "World-first SMS banking scam exposes weaknesses," Web page, July 2009. [Online]. Available: http://www.it-online.co.za/content/ view/1092105/142/
-
-
-
-
47
-
-
72449203010
-
A profitless endeavor: Phishing as tragedy of the commons
-
ACM
-
C. Herley and D. Florêncio, "A profitless endeavor: Phishing as tragedy of the commons," in Proc. NSPW'2008. ACM, 2008, pp. 59-70.
-
(2008)
Proc. NSPW'2008
, pp. 59-70
-
-
Herley, C.1
Florêncio, D.2
-
48
-
-
34548344520
-
Phishing activity trends report
-
Anti-Phishing Working Group, Online, Available
-
Anti-Phishing Working Group, "Phishing activity trends report, 2nd half/2008," 2009. [Online]. Available: http://www.antiphishing.org/reports/ apwg-report-H2-2008.pdf
-
(2009)
2nd half/2008
-
-
-
49
-
-
72449161457
-
-
Online, Available
-
Deutsche Bank, "Deutsche Bank at a glance," 2008. [Online]. Available: http://www.db.com/presse/en/download/DB-at-a-glance-2008.pdf
-
(2008)
Deutsche Bank at a glance
-
-
Bank, D.1
-
50
-
-
72449199996
-
-
Online, Available
-
Sparkasse Heidelberg, "Online-banking: Increased security with iTAN," 2006. [Online]. Available: http://www.sparkasse-heidelberg.com/spk- hden/pk/banking/itan.html
-
(2006)
Online-banking: Increased security with iTAN
-
-
-
51
-
-
72449131746
-
chipTAN: Listen werden überflüssig,
-
Online, Available
-
Berliner Sparkasse, "chipTAN: Listen werden überflüssig, " 2005. [Online]. Available: http://www.berliner-sparkasse.de/anzeigen.php? tpl=privatkunden/konten-karten/online-banking/tan-generator.html
-
(2005)
-
-
-
52
-
-
72449128418
-
-
Volksbank Solling eG, Sm@rt-TAN-plus, 2009. [Online]. Available: http://www.volksbank-solling.de/flycms/de/html/913/-/Smart+TAN+plus. html
-
Volksbank Solling eG, "Sm@rt-TAN-plus," 2009. [Online]. Available: http://www.volksbank-solling.de/flycms/de/html/913/-/Smart+TAN+plus. html
-
-
-
-
53
-
-
72449121723
-
New banking security system iTAN not as secure as claimed
-
RedTeam Pentesting GmbH, Online, Available
-
RedTeam Pentesting GmbH, "New banking security system iTAN not as secure as claimed," Advisory rt-sa-2005-014, 2005. [Online]. Available: http://www.redteam-pentesting.de/advisories/rt-sa-2005-014
-
(2005)
Advisory rt-sa-2005-014
-
-
-
54
-
-
72449144483
-
A-I3 Pressemeldung
-
Arbeitsgruppe Identitätsschutz im Internet, Update, Online, Available
-
Arbeitsgruppe Identitätsschutz im Internet, "A-I3 Pressemeldung: iTAN nur in Verbindung mit SSL sicher (Update)," 2005. [Online]. Available: https://www.a-i3.org/content/view/411/28
-
(2005)
iTAN nur in Verbindung mit SSL sicher
-
-
|