Phishing

Phishing and the Threat to Corporate Networks

Phishing Internet Security Whitepapers

This paper explains the online fraud known as phishing, examining how it threatens businesses and looking at the dramatic rise in the number of attacks over recent years. Phishing methods and tricks are described and ways of protecting computers and networks from phishing attacks are discussed.

Phishing Threats and Countermeasures

Phishing Internet Security Whitepapers

Phishing is one of the fastest growing scams on the Internet, compromising the personal details of millions of users worldwide. Typically instigated by professional hackers and criminal organizations, Phishing attacks use spoofed emails and fraudulent websites to deceive recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc. As a result of these scams, an increasing number of consumers have suffered credit card fraud, identity theft, and financial loss. The exclusive motivation of phishers is financial gain.

Spy-Phishing - A New Breed of Blended Threats

Phishing Internet Security Whitepapers

In this age of broadband, wireless, and network interconnectivity, we enjoy the unprecedented power of information exchange and commerce at our fingertips. Networks and systems are continuously evolving to become more robust, thereby maximizing our convenience and productivity – 24 hours a day, seven days a week. Just like any other computer security threat, spy-phishing did not just appear out of nowhere. Instead, it is just another point on the overall threat landscape. In fact, one can trace the progression that led to spy-phishing to a number of specific evolutionary factors in the threat world. This includes the shift in the overall intention of malicious writers, in addition to a number of technological evolutions, including spyware, phishing and pharming.

The Phishing Guide: Understanding and Preventing Phishing Attacks

Phishing Internet Security Whitepapers Social Engineering

This paper covers the technologies and security flaws Phishers exploit to conduct their attacks, and provides detailed vendor-neutral advice on what organisations can do to prevent future attacks. Security professionals and customers can use this comprehensive analysis to arm themselves against the next phishing scam to reach their in-tray.

Understanding and Preventing Phishing Attacks

Phishing Internet Security Whitepapers

This paper covers the technologies and security flaws Phishers exploit to conduct their attacks, and provides detailed vendor-neutral advice on what organisations can do to prevent future attacks. Security professionals and customers can use this comprehensive analysis to arm themselves against the next phishing scam to reach their in-tray.

Why Phishing Works

Phishing Internet Security Whitepapers

What makes a web site credible? This question has been addressed extensively by researchers in computer-human interaction. This paper examines a twist on this question: what makes a bogus website credible? In the last two years, Internet users have seen the rapid expansion of a scourge on the Internet: phishing, the practice of directing users to fraudulent web sites. This question raises fascinating questions for user interface designers, because both phishers and anti-phishers do battle in user interface space. Successful phishers must not only present a highcredibility web presence to their victims; they must create a presence that is so impressive that it causes the victim to fail to recognize security measures installed in web browsers.