44
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      "Reminder: please update your details": Phishing Trends

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Spam messes up users inbox, consumes resources and spread attacks like DDoS, MiM, Phishing etc., Phishing is a byproduct of email and causes financial loss to users and loss of reputation to financial institutions. In this paper we study the characteristics of phishing and technology used by phishers. In order to counter anti phishing technology, phishers change their mode of operation; therefore continuous evaluation of phishing helps us to combat phishers effectively. We have collected seven hundred thousand spam from a corporate server for a period of 13 months from February 2008 to February 2009. From the collected date, we identified different kinds of phishing scams and mode of their operation. Our observation shows that phishers are dynamic and depend more on social engineering techniques rather than software vulnerabilities. We believe that this study would be useful to develop more efficient anti phishing methodologies.

          Related collections

          Most cited references1

          • Record: found
          • Abstract: not found
          • Article: not found

          Social phishing

            Bookmark

            Author and article information

            Journal
            2010-10-13
            Article
            10.1109/NetCoM.2009.86
            1010.2802
            33f9baea-fe98-412d-b607-2c7d93c84f6d

            http://arxiv.org/licenses/nonexclusive-distrib/1.0/

            History
            Custom metadata
            6 pages, 6 Figures, NETCOM 2009, IEEE CS
            cs.CR cs.NI

            Security & Cryptology,Networking & Internet architecture
            Security & Cryptology, Networking & Internet architecture

            Comments

            Comment on this article