"Phishing" fraud [[electronic resource] ] : how to avoid getting fried by phony phishermen / / U.S. Securities and Exchange Commission |
Edizione | [[2007 ed.]] |
Pubbl/distr/stampa | [Washington, D.C.] : , : U.S. Securities and Exchange Commission, , [2007] |
Descrizione fisica | 1 electronic text : HTML file |
Soggetto topico |
Phishing
Internet fraud Consumer protection |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | "Phishing" fraud |
Record Nr. | UNINA-9910698869903321 |
[Washington, D.C.] : , : U.S. Securities and Exchange Commission, , [2007] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cómo evitar que lo 'pesquen' con una red de estafa electrónica [[electronic resource]] |
Pubbl/distr/stampa | [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2005] |
Descrizione fisica | 3 unnumbered pages : digital, PDF file |
Collana | Alerta de la FTC para consumidores |
Soggetto topico |
Phishing
Microcomputers - Security measures |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | spa |
Record Nr. | UNINA-9910695469403321 |
[Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2005] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
ECrime : 2014 APWG Symposium on Electronic Crime Research : 23-25 September 2014 |
Pubbl/distr/stampa | New York : , : IEEE, , 2014 |
Descrizione fisica | 1 online resource (58 pages) |
Soggetto topico |
Phishing
Malware (Computer software) Phishing - Prevention |
ISBN | 1-4799-6510-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996280531403316 |
New York : , : IEEE, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
ECrime : 2014 APWG Symposium on Electronic Crime Research : 23-25 September 2014 |
Pubbl/distr/stampa | New York : , : IEEE, , 2014 |
Descrizione fisica | 1 online resource (58 pages) |
Soggetto topico |
Phishing
Malware (Computer software) Phishing - Prevention |
ISBN | 1-4799-6510-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910141901003321 |
New York : , : IEEE, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Fake credit report sites [[electronic resource] ] : cashing in on your personal information |
Pubbl/distr/stampa | [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer and Business Education, , [2003] |
Descrizione fisica | 2 unnumbered pages : digital, PDF file |
Collana | FTC consumer alert |
Soggetto topico |
Credit ratings - Corrupt practices
Phishing Internet fraud |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Fake credit report sites |
Record Nr. | UNINA-9910697694203321 |
[Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer and Business Education, , [2003] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Hijacking our heroes : exploiting veterans through disinformation on social media : report of the Committee on Veterans' Affairs together with dissenting views |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2020 |
Descrizione fisica | 1 online resource (v, 64 pages) : illustrations |
Collana | Report / 116th Congress, 2d session, House of Representatives |
Soggetto topico |
Social media and society - United States
Disinformation - Social aspects - United States Computer crimes - United States Veterans - Abuse of - United States Phishing - United States Computer crimes Phishing Social media and society |
Soggetto genere / forma | Legislative materials. |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Hijacking our heroes |
Record Nr. | UNINA-9910715241003321 |
Washington : , : U.S. Government Publishing Office, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
How not to get hooked by a 'phishing' scam [[electronic resource]] |
Pubbl/distr/stampa | [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer & Business Education, , [2006] |
Descrizione fisica | 3 unnumbered pages : digital, PDF file |
Collana | FTC consumer alert |
Soggetto topico |
Phishing
Internet fraud |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910696132203321 |
[Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer & Business Education, , [2006] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Phishing and countermeasures [[electronic resource] ] : understanding the increasing problem of electronic identity theft / / edited by Markus Jakobsson, Steven Myers |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley-Interscience, c2007 |
Descrizione fisica | 1 online resource (730 p.) |
Disciplina |
005.9
364.163 |
Altri autori (Persone) |
JakobssonMarkus
MyersSteven <1975-> |
Soggetto topico |
Phishing
Identity theft - Prevention Computer security |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-82196-5
9786610821969 0-470-08610-6 0-470-08609-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Phishing and Countermeasures; CONTENTS; Preface; Acknowledgements; 1 Introduction to Phishing; 1.1 What is Phishing?; 1.2 A Brief History of Phishing; 1.3 The Costs to Society of Phishing; 1.4 A Typical Phishing Attack; 1.4.1 Phishing Example: America's Credit Unions; 1.4.2 Phishing Example: PayPal; 1.4.3 Making the Lure Convincing; 1.4.4 Setting The Hook; 1.4.5 Making the Hook Convincing; 1.4.6 The Catch; 1.4.7 Take-Down and Related Technologies; 1.5 Evolution of Phishing; 1.6 Case Study: Phishing on Froogle; 1.7 Protecting Users from Phishing; References
2 Phishing Attacks: Information Flow and Chokepoints2.1 Types of Phishing Attacks; 2.1.1 Deceptive Phishing; 2.1.2 Malware-Based Phishing; 2.1.3 DNS-Based Phishing ("Pharming"); 2.1.4 Content-Injection Phishing; 2.1.5 Man-in-the-Middle Phishing; 2.1.6 Search Engine Phishing; 2.2 Technology, Chokepoints, and Countermeasures; 2.2.1 Step 0: Preventing a Phishing Attack Before It Begins; 2.2.2 Step 1 : Preventing Delivery of Phishing Payload; 2.2.3 Step 2: Preventing or Disrupting a User Action; 2.2.4 Steps 2 and 4: Prevent Navigation and Data Compromise 2.2.5 Step 3: Preventing Transmission of the Prompt2.2.6 Step 4: Preventing Transmission of Confidential Information; 2.2.7 Steps 4 and 6: Preventing Data Entry and Rendering It Useless; 2.2.8 Step 5: Tracing Transmission of Compromised Credentials; 2.2.9 Step 6: Interfering with the Use of Compromised Information; 2.2.10 Step 7: Interfering with the Financial Benefit; References; 3 Spoofing and Countermeasures; 3.1 Email Spoofing; 3.1.1 Filtering; 3.1.2 Whitelisting and Greylisting; 3.1.3 Anti-spam Proposals; 3.1.4 User Education; 3.2 IP Spoofing; 3.2.1 IP Traceback 3.2.2 IP Spoofing Prevention3.2.3 Intradomain Spoofing; 3.3 Homograph Attacks Using Unicode; 3.3.1 Homograph Attacks; 3.3.2 Similar Unicode String Generation; 3.3.3 Methodology of Homograph Attack Detection; 3.4 Simulated Browser Attack; 3.4.1 Using the Illusion; 3.4.2 Web Spoofing; 3.4.3 SSL and Web Spoofing; 3.4.4 Ensnaring the User; 3.4.5 SpoofGuard Versus the Simulated Browser Attack; 3.5 Case Study: Warning the User About Active Web Spoofing; References; 4 Pharming and Client Side Attacks; 4.1 Malware; 4.1.1 Viruses and Worms; 4.1.2 Spyware; 4.1.3 Adware; 4.1.4 Browser Hijackers 4.1.5 Keyloggers4.1.6 Trojan Horses; 4.1.7 Rootkits; 4.1.8 Session Hijackers; 4.2 Malware Defense Strategies; 4.2.1 Defense Against Worms and Viruses; 4.2.2 Defense Against Spyware and Keyloggers; 4.2.3 Defense Against Rootkits; 4.3 Pharming; 4.3.1 Overview of DNS; 4.3.2 Role of DNS in Pharming; 4.3.3 Defense Against Pharming; 4.4 Case Study: Pharming with Appliances; 4.4.1 A Different Phishing Strategy; 4.4.2 The Spoof: A Home Pharming Appliance; 4.4.3 Sustainability of Distribution in the Online Marketplace; 4.4.4 Countermeasures; 4.5 Case Study: Race-Pharming; 4.5.1 Technical Description 4.5.2 Detection and Countermeasures |
Record Nr. | UNINA-9910143417103321 |
Hoboken, N.J., : Wiley-Interscience, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Phishing and countermeasures [[electronic resource] ] : understanding the increasing problem of electronic identity theft / / edited by Markus Jakobsson, Steven Myers |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley-Interscience, c2007 |
Descrizione fisica | 1 online resource (730 p.) |
Disciplina |
005.9
364.163 |
Altri autori (Persone) |
JakobssonMarkus
MyersSteven <1975-> |
Soggetto topico |
Phishing
Identity theft - Prevention Computer security |
ISBN |
1-280-82196-5
9786610821969 0-470-08610-6 0-470-08609-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Phishing and Countermeasures; CONTENTS; Preface; Acknowledgements; 1 Introduction to Phishing; 1.1 What is Phishing?; 1.2 A Brief History of Phishing; 1.3 The Costs to Society of Phishing; 1.4 A Typical Phishing Attack; 1.4.1 Phishing Example: America's Credit Unions; 1.4.2 Phishing Example: PayPal; 1.4.3 Making the Lure Convincing; 1.4.4 Setting The Hook; 1.4.5 Making the Hook Convincing; 1.4.6 The Catch; 1.4.7 Take-Down and Related Technologies; 1.5 Evolution of Phishing; 1.6 Case Study: Phishing on Froogle; 1.7 Protecting Users from Phishing; References
2 Phishing Attacks: Information Flow and Chokepoints2.1 Types of Phishing Attacks; 2.1.1 Deceptive Phishing; 2.1.2 Malware-Based Phishing; 2.1.3 DNS-Based Phishing ("Pharming"); 2.1.4 Content-Injection Phishing; 2.1.5 Man-in-the-Middle Phishing; 2.1.6 Search Engine Phishing; 2.2 Technology, Chokepoints, and Countermeasures; 2.2.1 Step 0: Preventing a Phishing Attack Before It Begins; 2.2.2 Step 1 : Preventing Delivery of Phishing Payload; 2.2.3 Step 2: Preventing or Disrupting a User Action; 2.2.4 Steps 2 and 4: Prevent Navigation and Data Compromise 2.2.5 Step 3: Preventing Transmission of the Prompt2.2.6 Step 4: Preventing Transmission of Confidential Information; 2.2.7 Steps 4 and 6: Preventing Data Entry and Rendering It Useless; 2.2.8 Step 5: Tracing Transmission of Compromised Credentials; 2.2.9 Step 6: Interfering with the Use of Compromised Information; 2.2.10 Step 7: Interfering with the Financial Benefit; References; 3 Spoofing and Countermeasures; 3.1 Email Spoofing; 3.1.1 Filtering; 3.1.2 Whitelisting and Greylisting; 3.1.3 Anti-spam Proposals; 3.1.4 User Education; 3.2 IP Spoofing; 3.2.1 IP Traceback 3.2.2 IP Spoofing Prevention3.2.3 Intradomain Spoofing; 3.3 Homograph Attacks Using Unicode; 3.3.1 Homograph Attacks; 3.3.2 Similar Unicode String Generation; 3.3.3 Methodology of Homograph Attack Detection; 3.4 Simulated Browser Attack; 3.4.1 Using the Illusion; 3.4.2 Web Spoofing; 3.4.3 SSL and Web Spoofing; 3.4.4 Ensnaring the User; 3.4.5 SpoofGuard Versus the Simulated Browser Attack; 3.5 Case Study: Warning the User About Active Web Spoofing; References; 4 Pharming and Client Side Attacks; 4.1 Malware; 4.1.1 Viruses and Worms; 4.1.2 Spyware; 4.1.3 Adware; 4.1.4 Browser Hijackers 4.1.5 Keyloggers4.1.6 Trojan Horses; 4.1.7 Rootkits; 4.1.8 Session Hijackers; 4.2 Malware Defense Strategies; 4.2.1 Defense Against Worms and Viruses; 4.2.2 Defense Against Spyware and Keyloggers; 4.2.3 Defense Against Rootkits; 4.3 Pharming; 4.3.1 Overview of DNS; 4.3.2 Role of DNS in Pharming; 4.3.3 Defense Against Pharming; 4.4 Case Study: Pharming with Appliances; 4.4.1 A Different Phishing Strategy; 4.4.2 The Spoof: A Home Pharming Appliance; 4.4.3 Sustainability of Distribution in the Online Marketplace; 4.4.4 Countermeasures; 4.5 Case Study: Race-Pharming; 4.5.1 Technical Description 4.5.2 Detection and Countermeasures |
Record Nr. | UNINA-9910830161303321 |
Hoboken, N.J., : Wiley-Interscience, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Phishing and countermeasures [[electronic resource] ] : understanding the increasing problem of electronic identity theft / / edited by Markus Jakobsson, Steven Myers |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley-Interscience, c2007 |
Descrizione fisica | 1 online resource (730 p.) |
Disciplina |
005.9
364.163 |
Altri autori (Persone) |
JakobssonMarkus
MyersSteven <1975-> |
Soggetto topico |
Phishing
Identity theft - Prevention Computer security |
ISBN |
1-280-82196-5
9786610821969 0-470-08610-6 0-470-08609-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Phishing and Countermeasures; CONTENTS; Preface; Acknowledgements; 1 Introduction to Phishing; 1.1 What is Phishing?; 1.2 A Brief History of Phishing; 1.3 The Costs to Society of Phishing; 1.4 A Typical Phishing Attack; 1.4.1 Phishing Example: America's Credit Unions; 1.4.2 Phishing Example: PayPal; 1.4.3 Making the Lure Convincing; 1.4.4 Setting The Hook; 1.4.5 Making the Hook Convincing; 1.4.6 The Catch; 1.4.7 Take-Down and Related Technologies; 1.5 Evolution of Phishing; 1.6 Case Study: Phishing on Froogle; 1.7 Protecting Users from Phishing; References
2 Phishing Attacks: Information Flow and Chokepoints2.1 Types of Phishing Attacks; 2.1.1 Deceptive Phishing; 2.1.2 Malware-Based Phishing; 2.1.3 DNS-Based Phishing ("Pharming"); 2.1.4 Content-Injection Phishing; 2.1.5 Man-in-the-Middle Phishing; 2.1.6 Search Engine Phishing; 2.2 Technology, Chokepoints, and Countermeasures; 2.2.1 Step 0: Preventing a Phishing Attack Before It Begins; 2.2.2 Step 1 : Preventing Delivery of Phishing Payload; 2.2.3 Step 2: Preventing or Disrupting a User Action; 2.2.4 Steps 2 and 4: Prevent Navigation and Data Compromise 2.2.5 Step 3: Preventing Transmission of the Prompt2.2.6 Step 4: Preventing Transmission of Confidential Information; 2.2.7 Steps 4 and 6: Preventing Data Entry and Rendering It Useless; 2.2.8 Step 5: Tracing Transmission of Compromised Credentials; 2.2.9 Step 6: Interfering with the Use of Compromised Information; 2.2.10 Step 7: Interfering with the Financial Benefit; References; 3 Spoofing and Countermeasures; 3.1 Email Spoofing; 3.1.1 Filtering; 3.1.2 Whitelisting and Greylisting; 3.1.3 Anti-spam Proposals; 3.1.4 User Education; 3.2 IP Spoofing; 3.2.1 IP Traceback 3.2.2 IP Spoofing Prevention3.2.3 Intradomain Spoofing; 3.3 Homograph Attacks Using Unicode; 3.3.1 Homograph Attacks; 3.3.2 Similar Unicode String Generation; 3.3.3 Methodology of Homograph Attack Detection; 3.4 Simulated Browser Attack; 3.4.1 Using the Illusion; 3.4.2 Web Spoofing; 3.4.3 SSL and Web Spoofing; 3.4.4 Ensnaring the User; 3.4.5 SpoofGuard Versus the Simulated Browser Attack; 3.5 Case Study: Warning the User About Active Web Spoofing; References; 4 Pharming and Client Side Attacks; 4.1 Malware; 4.1.1 Viruses and Worms; 4.1.2 Spyware; 4.1.3 Adware; 4.1.4 Browser Hijackers 4.1.5 Keyloggers4.1.6 Trojan Horses; 4.1.7 Rootkits; 4.1.8 Session Hijackers; 4.2 Malware Defense Strategies; 4.2.1 Defense Against Worms and Viruses; 4.2.2 Defense Against Spyware and Keyloggers; 4.2.3 Defense Against Rootkits; 4.3 Pharming; 4.3.1 Overview of DNS; 4.3.2 Role of DNS in Pharming; 4.3.3 Defense Against Pharming; 4.4 Case Study: Pharming with Appliances; 4.4.1 A Different Phishing Strategy; 4.4.2 The Spoof: A Home Pharming Appliance; 4.4.3 Sustainability of Distribution in the Online Marketplace; 4.4.4 Countermeasures; 4.5 Case Study: Race-Pharming; 4.5.1 Technical Description 4.5.2 Detection and Countermeasures |
Record Nr. | UNINA-9910841896303321 |
Hoboken, N.J., : Wiley-Interscience, c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|