-
1
-
-
72449138417
-
-
May, online, Available:, Accessed: Jan. 10, 2009
-
Messagelabs, "MessageLabs Intelligence May 2009," 2009. [online]. Available: http://www.messagelabs.com/intelligence.aspx. [Accessed: Jan. 10, 2009].
-
(2009)
MessageLabs Intelligence
, pp. 2009
-
-
-
2
-
-
35348884906
-
A large-scale study of web password habits
-
New York, NY, USA, ACM Press
-
D. Florencio and C. Herley, "A large-scale study of web password habits," In WWW '07: Proceedings of the 16th international conference on World Wide Web, pages 657-666, New York, NY, USA, 2007. ACM Press.
-
(2007)
WWW '07: Proceedings of the 16th international conference on World Wide Web
, pp. 657-666
-
-
Florencio, D.1
Herley, C.2
-
3
-
-
77953898602
-
Examining the Impact of Website Takedown on Phishing
-
New York, NY, USA, ACM Press
-
T. Moore and R. Clayton, "Examining the Impact of Website Takedown on Phishing," In eCrime '07: Proceedings of the 2007 e-Crime Researchers summit, pages 1-13, New York, NY, USA, 2007. ACM Press.
-
(2007)
eCrime '07: Proceedings of the 2007 e-Crime Researchers summit
, pp. 1-13
-
-
Moore, T.1
Clayton, R.2
-
5
-
-
72449168267
-
-
Google Inc, online] Available:, Accessed: Jan. 10, 2009
-
Google Inc, "Google safe browsing for Firefox," 2007. [online] Available:http://www.google.com/tools/firefox/safebrowsing/. [Accessed: Jan. 10, 2009].
-
(2007)
Google safe browsing for Firefox
-
-
-
6
-
-
72449189001
-
-
online] Available:, Accessed: Jan. 10, 2009
-
Microsoft Corporation, "Phishing filter: Help protect yourself from online scams," 2008. [online] Available: http://www.microsoft.com/protect/ products/yourself/phishingfilter.mspx. [Accessed: Jan. 10, 2009].
-
(2008)
Phishing filter: Help protect yourself from online scams
-
-
-
7
-
-
72449128420
-
-
Apple Inc. Visited Jan 1
-
Apple Inc. Visited Jan 1, 2009. http://www.apple.com/safari/features. html#security.
-
(2009)
-
-
-
8
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of Internet miscreants
-
New York, NY, USA, ACM, pp
-
J. Franklin, V. Paxson, A. Perrig, and S. Savage, "An inquiry into the nature and causes of the wealth of Internet miscreants," In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security (New York, NY, USA, 2007), ACM, pp. 375-388.
-
(2007)
CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 375-388
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
9
-
-
84940457409
-
-
Information Week, online] Available:, Accessed: Jan 10, 2009
-
G. Keizer, "Phishers Beat Bank's Two-factor Authentication," Information Week, 2006. [online] Available: http://www.informationweek.com/news/ showArticle.jhtml?articleID=190400362. [Accessed: Jan 10, 2009]
-
(2006)
Phishers Beat Bank's Two-factor Authentication
-
-
Keizer, G.1
-
10
-
-
28144438457
-
-
Financial Services Technology Consortium, White Paper, 2005, online, Available:, Accessed: Jan 10, 2009
-
Financial Services Technology Consortium, "Understanding and Countering the Phishing Threat," White Paper, 2005. [online]. Available: http://www.fstc.org/projects/docs/FSTC-Counter-Phishing-Project-Whitepaper.pdf. [Accessed: Jan 10, 2009]
-
Understanding and Countering the Phishing Threat
-
-
-
11
-
-
33748985945
-
-
Identity Theft Technology Council, online, Available:, Accessed Jan. 10, 2009
-
Identity Theft Technology Council, "Online identity theft: Phishing technology, chokepoints and countermeasures," 2005. [online]. Available: http://www.antiphishing.org/Phishing-dhs-report.pdf. [Accessed Jan. 10, 2009]
-
(2005)
Online identity theft: Phishing technology, chokepoints and countermeasures
-
-
-
12
-
-
72449177740
-
A Call for Action
-
National Consumers League, Report, online, Available:, Accessed: Jan. 10
-
National Consumers League, "A Call for Action: Report from National Consumers League Anti-Phishing Retreat," Report, 2006. [online]. Available: http://www.nclnet.org/news/2006/Final%20NC%20Phishing%20Report.pdf. [Accessed: Jan. 10, 2009].
-
(2006)
Report from National Consumers League Anti-Phishing Retreat
-
-
-
13
-
-
72449206949
-
-
Dept. of Homeland Security and the Anti-phishing Working Group, The crimeware landscape: malware, phishing, identity theft and beyond, Report, 2006. [online]. Available: http://www.antiphishing.org/reports/APWG- CrimewareReport.pdf. [Accessed: Jun. 10, 2009].
-
Dept. of Homeland Security and the Anti-phishing Working Group, "The crimeware landscape: malware, phishing, identity theft and beyond," Report, 2006. [online]. Available: http://www.antiphishing.org/reports/APWG- CrimewareReport.pdf. [Accessed: Jun. 10, 2009].
-
-
-
-
14
-
-
72449211627
-
What to Do If Your Website Has Been Hacked by Phishers
-
Anti-Phishing Working Group, online, Available:, Accessed May. 18, 2009
-
Anti-Phishing Working Group, "What to Do If Your Website Has Been Hacked by Phishers," Report, 2009. [online]. Available: http://www.apwg.org/reports/APWG-WTD-HackedWebsite.pdf. [Accessed May. 18, 2009].
-
(2009)
Report
-
-
-
15
-
-
72449205832
-
-
Anti-Phishing Working Group, Anti-Phishing Best Practices Recommendations for Registrars, Report, 2008. [online] Available: http://www.apwg.org/reports/APWG-RegistrarBestPractices.pdf. [Accesse May. 18,2009].
-
Anti-Phishing Working Group, "Anti-Phishing Best Practices Recommendations for Registrars," Report, 2008. [online] Available: http://www.apwg.org/reports/APWG-RegistrarBestPractices.pdf. [Accesse May. 18,2009].
-
-
-
-
16
-
-
72449135596
-
Anti-Phishing Best Practices for ISPs and Mailbox Providers
-
Message Anti-Abuse Working Group and Anti-Phishing Working Group, online, Available:, Accessed May. 18,2009
-
Message Anti-Abuse Working Group and Anti-Phishing Working Group, "Anti-Phishing Best Practices for ISPs and Mailbox Providers," Report, 2006. [online]. Available: http://www.apwg.org/reports/bestpracticesforisps. pdf. [Accessed May. 18,2009]
-
(2006)
Report
-
-
-
17
-
-
0003529429
-
-
third ed. McGraw Hill, New York, NY, USA
-
R. Rosenthal, R.L. Rosnow. Essentials of Behavioral Research, third ed. McGraw Hill, New York, NY, USA, 2008.
-
(2008)
Essentials of Behavioral Research
-
-
Rosenthal, R.1
Rosnow, R.L.2
-
18
-
-
84880704933
-
Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial Firm
-
Harvard University. Available:, Accessed: Jun 10, 2009
-
S. Dynes, H. Brechbuhl and M. E. Johnson, "Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial Firm," Fourth Workshop on the Economics of Information Security, Harvard University. Available:http://infosecon.net/workshop/pdf/51.pdf. [Accessed: Jun 10, 2009]
-
Fourth Workshop on the Economics of Information Security
-
-
Dynes, S.1
Brechbuhl, H.2
Johnson, M.E.3
-
19
-
-
84877884804
-
Private Sector Cyber Security Investment: An Empirical Analysis
-
Cambridge, UK. Available:, Accessed: Jun 10, 2009
-
B.R. Rowe and M. P. Gallaher, "Private Sector Cyber Security Investment: An Empirical Analysis," Fifth Workshop on the Economics of Information Security, 2006, Cambridge, UK. Available: http://weis2006. econinfosec.org/docs/18.pdf. [Accessed: Jun 10, 2009]
-
(2006)
Fifth Workshop on the Economics of Information Security
-
-
Rowe, B.R.1
Gallaher, M.P.2
-
20
-
-
85084095292
-
-
T. Moore, R. Clayton and H. Stern, Temporal Correlations between Spam and Phishing Websites, 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '09). April 21, 2009: Boston, MA.
-
T. Moore, R. Clayton and H. Stern, "Temporal Correlations between Spam and Phishing Websites," 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '09). April 21, 2009: Boston, MA.
-
-
-
-
21
-
-
34848911641
-
Social phishing
-
Commun. ACM 50, 10 Oct., 94-100. DOI
-
T.N. Jagatic, N.A. Johnson, M. Jakobsson, and F. Menczer, "Social phishing," Commun. ACM 50, 10 (Oct. 2007), 94-100. DOI= http://doi.acm.org/10.1145/1290958.1290968
-
(2007)
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
22
-
-
72449140857
-
-
online, Available:, Accessed: Mar. 19, 2009
-
Symantec, "Symantec Global Internet Security Threat Report," volume XIV, 2009. [online]. Available: http://eval.symantec.com/mktginfo/ enterprise/white-papers/b-whitepaper-internet-security-threat-report-xiv-04- 2009.en-us.pdf. [Accessed: Mar. 19, 2009].
-
(2009)
Symantec Global Internet Security Threat Report
, vol.14
-
-
-
23
-
-
72449159034
-
-
Merchant Risk Council, March 3, 2009, online, Available:, Accessed: June 10, 2009
-
Merchant Risk Council, "Annual e-Commerce Fraud Survey Results," March 3, 2009. [online]. Available: https://www. merchantriskcouncil.org/index.cfm?fuseaction=Feature.showFeature&FeatureID= 119. [Accessed: June 10, 2009].
-
Annual e-Commerce Fraud Survey Results
-
-
-
24
-
-
0344792106
-
Managing Online Security Risks
-
New York, NY, Jun 1, 2000, online, Available:, Accessed: Jun 1, 2009
-
H. Varian, "Managing Online Security Risks," New York Times; New York, NY.; Jun 1, 2000. [online]. Available: http://people.ischool.berkeley. edu/~hal/people/hal/NYTimes/2000-06-01.html. [Accessed: Jun 1, 2009].
-
New York Times
-
-
Varian, H.1
-
25
-
-
57649166927
-
You've been warned: An empirical study of the effectiveness of web browser phishing warnings
-
New York, NY, USA, ACM
-
S. Egelman, L. F. Cranor, and J. Hong, "You've been warned: an empirical study of the effectiveness of web browser phishing warnings," In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 1065-1074, New York, NY, USA, 2008. ACM.
-
(2008)
CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems
, pp. 1065-1074
-
-
Egelman, S.1
Cranor, L.F.2
Hong, J.3
-
26
-
-
72449193465
-
-
Net Applications. Inc, Browser market share Q4 2008, [online]. Available: http://marketshare.hitslink.com/report.aspx?qprid= 0&qpmr=15&qpdt=1&qpct=3&qpcal=l&qptimeframe=Q&qpsp=39. [Accessed: Jan. 10, 2009].
-
Net Applications. Inc, "Browser market share Q4 2008," [online]. Available: http://marketshare.hitslink.com/report.aspx?qprid= 0&qpmr=15&qpdt=1&qpct=3&qpcal=l&qptimeframe=Q&qpsp=39. [Accessed: Jan. 10, 2009].
-
-
-
-
27
-
-
72449133182
-
-
Zone Alarm, Smart Defense System, 2004 [online]. Available: http://smartdefense.zonealarm.com/tmpl/AdvisoryArticle?action=detail&aid= 20040128sa-000013. [Accessed: Jun. 1 2009].
-
Zone Alarm, "Smart Defense System", 2004 [online]. Available: http://smartdefense.zonealarm.com/tmpl/AdvisoryArticle?action=detail&aid= 20040128sa-000013. [Accessed: Jun. 1 2009].
-
-
-
-
28
-
-
33751312628
-
Time to Live on the Network,
-
Technical Report, online, Available:, Accessed: Jun 10
-
Avantgarde, "Time to Live on the Network," Technical Report, 2004. [online]. Available:http://www.avantgarde.com/xxxxttln.pdf. [Accessed: Jun 10, 2009]
-
(2004)
-
-
-
29
-
-
72449169885
-
-
T. Moore and R. Clayton. Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing, 13th International Conference on Financial Cryptography and Data Security. February 23-26, 2009: Barbados.
-
T. Moore and R. Clayton. "Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing," 13th International Conference on Financial Cryptography and Data Security. February 23-26, 2009: Barbados.
-
-
-
-
30
-
-
84904793179
-
-
S. Sheng, B. Wardman, G. Warner, L.F. Cranor, J. Hong, and C. Zhang, An Empirical Analysis of Phishing Blacklists, To appear in 6th Conference in Email and Anti-Spam (Mountain view, CA, July 16-17, 2009). CEAS '09.
-
S. Sheng, B. Wardman, G. Warner, L.F. Cranor, J. Hong, and C. Zhang, "An Empirical Analysis of Phishing Blacklists," To appear in 6th Conference in Email and Anti-Spam (Mountain view, CA, July 16-17, 2009). CEAS '09.
-
-
-
-
31
-
-
67249096586
-
-
T. Moore and R. Clayton, The Consequence of Non-Cooperation in the Fight Against Phishing, Third APWG eCrime Researchers Summit. October 15-16, 2008: Atlanta, GA.
-
T. Moore and R. Clayton, "The Consequence of Non-Cooperation in the Fight Against Phishing," Third APWG eCrime Researchers Summit. October 15-16, 2008: Atlanta, GA.
-
-
-
-
32
-
-
84858981488
-
Host of Internet Spam Groups Is Cut Off,
-
Nov. 12
-
B. Krebs, "Host of Internet Spam Groups Is Cut Off," Washington Post, Nov. 12, 2008.
-
(2008)
Washington Post
-
-
Krebs, B.1
-
33
-
-
72449162906
-
-
Interactive, April 2, online, Available:, Accessed: Jun 1, 2009
-
D. Danchev, "Google: Spam volume for Q1 back to pre-McColo levels," CBS Interactive, April 2, 2009. [online]. Available: http://blogs.zdnet.com/security/?p=3073&tag=rbxccnbzd1. [Accessed: Jun 1, 2009].
-
(2009)
Google: Spam volume for Q1 back to pre-McColo levels
-
-
Danchev, D.1
-
34
-
-
72449157784
-
-
R.E. Church, McColo and the Difficulty of Fighting Spam, Internet.com, November 20, 2008. [online]. Available: http://itmanagement. earthweb.com/features/print.php/3786296. [Accessed: Jun. 1 2009].
-
R.E. Church, "McColo and the Difficulty of Fighting Spam", Internet.com, November 20, 2008. [online]. Available: http://itmanagement. earthweb.com/features/print.php/3786296. [Accessed: Jun. 1 2009].
-
-
-
-
35
-
-
72449188031
-
-
ASSOCIATEDBANK-CORP v. EARTHLINK, INC. Memorandum and order, 05-c-0233-s 2005. Available:http://www.iplawobserver.com/cases/2005-09-14-Associated-Banc- Corp-CDA-Section-230.pdf. [Accessed: Mar. 18, 2009].
-
ASSOCIATEDBANK-CORP v. EARTHLINK, INC. Memorandum and order, 05-c-0233-s 2005. Available:http://www.iplawobserver.com/cases/2005-09-14-Associated-Banc- Corp-CDA-Section-230.pdf. [Accessed: Mar. 18, 2009].
-
-
-
-
36
-
-
37849049401
-
On the effectiveness of techniques to detect phishing sites
-
Berlin, Heidelberg, Springer-Verlag
-
C. Ludl, S. Mcallister, E. Kirda, and C. Kruegel, "On the effectiveness of techniques to detect phishing sites," In DIMVA '07: Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pages 20-39, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
DIMVA '07: Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 20-39
-
-
Ludl, C.1
Mcallister, S.2
Kirda, E.3
Kruegel, C.4
-
37
-
-
80052998524
-
Global Phishing Survey: Trends and Domain name use in 2H 2008
-
The Anti-phishing Working Group, May, online, Available:, Accessed: Jun. 1
-
The Anti-phishing Working Group, "Global Phishing Survey: Trends and Domain name use in 2H 2008", May 2009. [online]. Available: http://www.antiphishing.org/reports/APWG-GlobalPhishingSurvey2H2008.pdf. [Accessed: Jun. 1, 2009].
-
(2009)
-
-
-
38
-
-
72449134661
-
An Adaptive Shingling-based Approach using Search Engines for Zero False Positive Phish Detection, 2009
-
G. Xiang and J. Hong, "An Adaptive Shingling-based Approach using Search Engines for Zero False Positive Phish Detection," 2009. Under Submission.
-
Under Submission
-
-
Xiang, G.1
Hong, J.2
-
40
-
-
36849090201
-
Teaching Johnny not to fall for phish,
-
Tech. rep, Available
-
P. Kumaraguru, S. Sheng., A. Acquisti, L.F.Cranor, and J. Hong, "Teaching Johnny not to fall for phish," Tech. rep. 2007, Carnegie Mellon University. Available:http://www.cylab.cmu.edu/files/cmucylab07003.pdf.
-
(2007)
-
-
Kumaraguru, P.1
Sheng, S.2
Acquisti, A.3
Cranor, L.F.4
Hong, J.5
-
41
-
-
77953876778
-
Getting users to pay attention to anti-phishing education: Evaluation of retention and transfer
-
Anti-Phishing Working Group, October 4, Pittsburgh, USA
-
P. Kumaraguru, Y. Rhee, S. Sheng, S. Hasan, A. Acquisti, L.F. Cranor, and J. Hong, "Getting users to pay attention to anti-phishing education: Evaluation of retention and transfer." e-Crime Researchers Summit, Anti-Phishing Working Group, October 4 - 5, 2007, Pittsburgh, USA.
-
(2007)
e-Crime Researchers Summit
, vol.5
-
-
Kumaraguru, P.1
Rhee, Y.2
Sheng, S.3
Hasan, S.4
Acquisti, A.5
Cranor, L.F.6
Hong, J.7
-
42
-
-
70350714542
-
School of phish: A real-word evaluation of antiphishing training
-
to appear in, Mountain view
-
P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M. A. Blair, and T. Pham, "School of phish: A real-word evaluation of antiphishing training," to appear in Symposium for Usable Privacy and Security (SOUPS), Mountain view, 2009.
-
(2009)
Symposium for Usable Privacy and Security (SOUPS)
-
-
Kumaraguru, P.1
Cranshaw, J.2
Acquisti, A.3
Cranor, L.4
Hong, J.5
Blair, M.A.6
Pham, T.7
-
43
-
-
36849073159
-
Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish
-
New York, NY, USA, ACM
-
S. Sheng, B. Magnien, P. Kumaraguru, A. Acquisti, L. F. Cranor, J. Hong, and E. Nunge, "Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish." In SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security, pages 88-99, New York, NY, USA, 2007. ACM.
-
(2007)
SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and security
, pp. 88-99
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
Acquisti, A.4
Cranor, L.F.5
Hong, J.6
Nunge, E.7
|