Grobler, MM2010-11-112010-11-112010-08Grobler, MM. 2010. Phishing for fortune. 2010 Information Security for South Africa conference. Sandton, South Africa, 2 - 4 August 2010, pp 8978-1-4244-5494-5http://hdl.handle.net/10204/45532010 Information Security for South Africa conference. Sandton, South Africa, 2 - 4 August 2010Phishing is an attempt by a third party to solicit confidential information from an individual, group or organization. Phishers attempt to trick users into disclosing personal data, such as credit card numbers, online banking credentials and other sensitive information, which they may then use to commit fraudulent acts. There has been an increase in attack diversity and technical sophistication by people conducting phishing and online financial fraud, making it necessary for Internet users to be aware of new trends. This article presents a holistic view of the cyber criminal attack type phishing. It presents a brief history of phishing, explains how phishing works, as well as variations on the attack type and real-life examples.enPhishingMan in the middleCross site scriptingURL obfuscationCyber criminalPhishing for fortuneConference PresentationGrobler, M. (2010). Phishing for fortune. http://hdl.handle.net/10204/4553Grobler, MM. "Phishing for fortune." (2010): http://hdl.handle.net/10204/4553Grobler M, Phishing for fortune; 2010. http://hdl.handle.net/10204/4553 .TY - Conference Presentation AU - Grobler, MM AB - Phishing is an attempt by a third party to solicit confidential information from an individual, group or organization. Phishers attempt to trick users into disclosing personal data, such as credit card numbers, online banking credentials and other sensitive information, which they may then use to commit fraudulent acts. There has been an increase in attack diversity and technical sophistication by people conducting phishing and online financial fraud, making it necessary for Internet users to be aware of new trends. This article presents a holistic view of the cyber criminal attack type phishing. It presents a brief history of phishing, explains how phishing works, as well as variations on the attack type and real-life examples. DA - 2010-08 DB - ResearchSpace DP - CSIR KW - Phishing KW - Man in the middle KW - Cross site scripting KW - URL obfuscation KW - Cyber criminal LK - https://researchspace.csir.co.za PY - 2010 SM - 978-1-4244-5494-5 T1 - Phishing for fortune TI - Phishing for fortune UR - http://hdl.handle.net/10204/4553 ER -