ResearchSpace

Phishing for fortune

Show simple item record

dc.contributor.author Grobler, MM
dc.date.accessioned 2010-11-11T12:10:08Z
dc.date.available 2010-11-11T12:10:08Z
dc.date.issued 2010-08
dc.identifier.citation Grobler, MM. 2010. Phishing for fortune. 2010 Information Security for South Africa conference. Sandton, South Africa, 2 - 4 August 2010, pp 8 en
dc.identifier.isbn 978-1-4244-5494-5
dc.identifier.uri http://hdl.handle.net/10204/4553
dc.description 2010 Information Security for South Africa conference. Sandton, South Africa, 2 - 4 August 2010 en
dc.description.abstract Phishing is an attempt by a third party to solicit confidential information from an individual, group or organization. Phishers attempt to trick users into disclosing personal data, such as credit card numbers, online banking credentials and other sensitive information, which they may then use to commit fraudulent acts. There has been an increase in attack diversity and technical sophistication by people conducting phishing and online financial fraud, making it necessary for Internet users to be aware of new trends. This article presents a holistic view of the cyber criminal attack type phishing. It presents a brief history of phishing, explains how phishing works, as well as variations on the attack type and real-life examples. en
dc.language.iso en en
dc.relation.ispartofseries Conference Paper en
dc.subject Phishing en
dc.subject Man in the middle en
dc.subject Cross site scripting en
dc.subject URL obfuscation en
dc.subject Cyber criminal en
dc.title Phishing for fortune en
dc.type Conference Presentation en
dc.identifier.apacitation Grobler, M. (2010). Phishing for fortune. http://hdl.handle.net/10204/4553 en_ZA
dc.identifier.chicagocitation Grobler, MM. "Phishing for fortune." (2010): http://hdl.handle.net/10204/4553 en_ZA
dc.identifier.vancouvercitation Grobler M, Phishing for fortune; 2010. http://hdl.handle.net/10204/4553 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Grobler, MM AB - Phishing is an attempt by a third party to solicit confidential information from an individual, group or organization. Phishers attempt to trick users into disclosing personal data, such as credit card numbers, online banking credentials and other sensitive information, which they may then use to commit fraudulent acts. There has been an increase in attack diversity and technical sophistication by people conducting phishing and online financial fraud, making it necessary for Internet users to be aware of new trends. This article presents a holistic view of the cyber criminal attack type phishing. It presents a brief history of phishing, explains how phishing works, as well as variations on the attack type and real-life examples. DA - 2010-08 DB - ResearchSpace DP - CSIR KW - Phishing KW - Man in the middle KW - Cross site scripting KW - URL obfuscation KW - Cyber criminal LK - https://researchspace.csir.co.za PY - 2010 SM - 978-1-4244-5494-5 T1 - Phishing for fortune TI - Phishing for fortune UR - http://hdl.handle.net/10204/4553 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record