Sciweavers

244 search results - page 1 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
SEC
2007
13 years 6 months ago
Phishing in the Wireless: Implementation and Analysis
Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, ...
JCS
2010
135views more  JCS 2010»
13 years 3 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
IEEECIT
2010
IEEE
13 years 3 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
EUROSYS
2008
ACM
14 years 1 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
JDFP
2006
109views more  JDFP 2006»
13 years 4 months ago
Warkitting: The Drive-by Subversion of Wireless Home Routers
In this paper we introduce the notion of warkitting as the drive-by subversion of wireless home routers through unauthorized access by mobile WiFi clients. We describe how such at...
Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wet...