DocumentCode
19269
Title
The Compleat Story of Phish
Author
Orman, Hilarie
Volume
17
Issue
1
fYear
2013
fDate
Jan.-Feb. 2013
Firstpage
87
Lastpage
91
Abstract
Deceptive email that leads unwary users to disclose sensitive information on fake websites is the most common form of malware seen by today\´s users. The technology behind these attacks uses the Internet\´s weak notion of "place" and the increasing use of websites for financial transactions. Users can protect themselves through precautionary measures, and experts learn to accurately identify malicious email.
Keywords
Internet; Web sites; finance; invasive software; unsolicited e-mail; Internet; Websites; deceptive email; financial transactions; malicious email; malware; phish; sensitive information; Browsers; Computer security; Electronic mail; IP networks; Internet; Malware; malware; phishing; security;
fLanguage
English
Journal_Title
Internet Computing, IEEE
Publisher
ieee
ISSN
1089-7801
Type
jour
DOI
10.1109/MIC.2013.16
Filename
6415920
Link To Document