Sciweavers

524 search results - page 10 / 105
» Why phishing works
Sort
View
ECRIME
2007
14 years 11 days ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
EUROSYS
2008
ACM
14 years 5 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
TOIT
2008
92views more  TOIT 2008»
13 years 8 months ago
Security and identification indicators for browsers against spoofing and phishing attacks
In spite of the use of standard web security measures (SSL/TLS), users enter sensitive information such as passwords into scam web sites. Such scam sites cause substantial damages...
Amir Herzberg, Ahmad Jbara
JOT
2008
88views more  JOT 2008»
13 years 8 months ago
It depends on what you mean by 'working'
Often efforts to change techniques or processes are met by "But its working, why change now?" Usually the impetous for change comes from someone who does not believe it ...
John McGregor
CHI
2011
ACM
13 years 17 hour ago
Does domain highlighting help people identify phishing sites?
Phishers are fraudsters that mimic legitimate websites to steal user’s credential information and exploit that information for identity theft and other criminal activities. Vari...
Eric Lin, Saul Greenberg, Eileah Trotter, David Ma...