"Phishing" fraud [[electronic resource] ] : how to avoid getting fried by phony phishermen / / U.S. Securities and Exchange Commission
| "Phishing" fraud [[electronic resource] ] : how to avoid getting fried by phony phishermen / / U.S. Securities and Exchange Commission |
| Edizione | [[2007 ed.]] |
| Pubbl/distr/stampa | [Washington, D.C.] : , : U.S. Securities and Exchange Commission, , [2007] |
| Descrizione fisica | 1 electronic text : HTML file |
| Soggetto topico |
Phishing
Internet fraud Consumer protection |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | "Phishing" fraud |
| Record Nr. | UNINA-9910698869903321 |
| [Washington, D.C.] : , : U.S. Securities and Exchange Commission, , [2007] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cómo evitar que lo 'pesquen' con una red de estafa electrónica [[electronic resource]]
| Cómo evitar que lo 'pesquen' con una red de estafa electrónica [[electronic resource]] |
| Pubbl/distr/stampa | [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2005] |
| Descrizione fisica | 3 unnumbered pages : digital, PDF file |
| Collana | Alerta de la FTC para consumidores |
| Soggetto topico |
Phishing
Microcomputers - Security measures |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | spa |
| Record Nr. | UNINA-9910695469403321 |
| [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, , [2005] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
ECrime : 2014 APWG Symposium on Electronic Crime Research : 23-25 September 2014
| ECrime : 2014 APWG Symposium on Electronic Crime Research : 23-25 September 2014 |
| Pubbl/distr/stampa | New York : , : IEEE, , 2014 |
| Descrizione fisica | 1 online resource (58 pages) |
| Soggetto topico |
Phishing
Malware (Computer software) Phishing - Prevention |
| ISBN | 1-4799-6510-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996280531403316 |
| New York : , : IEEE, , 2014 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
ECrime : 2014 APWG Symposium on Electronic Crime Research : 23-25 September 2014
| ECrime : 2014 APWG Symposium on Electronic Crime Research : 23-25 September 2014 |
| Pubbl/distr/stampa | New York : , : IEEE, , 2014 |
| Descrizione fisica | 1 online resource (58 pages) |
| Soggetto topico |
Phishing
Malware (Computer software) Phishing - Prevention |
| ISBN | 1-4799-6510-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910141901003321 |
| New York : , : IEEE, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Fake credit report sites [[electronic resource] ] : cashing in on your personal information
| Fake credit report sites [[electronic resource] ] : cashing in on your personal information |
| Pubbl/distr/stampa | [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer and Business Education, , [2003] |
| Descrizione fisica | 2 unnumbered pages : digital, PDF file |
| Collana | FTC consumer alert |
| Soggetto topico |
Credit ratings - Corrupt practices
Phishing Internet fraud |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Fake credit report sites |
| Record Nr. | UNINA-9910697694203321 |
| [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer and Business Education, , [2003] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hijacking our heroes : exploiting veterans through disinformation on social media : report of the Committee on Veterans' Affairs together with dissenting views
| Hijacking our heroes : exploiting veterans through disinformation on social media : report of the Committee on Veterans' Affairs together with dissenting views |
| Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2020 |
| Descrizione fisica | 1 online resource (v, 64 pages) : illustrations |
| Collana | Report / 116th Congress, 2d session, House of Representatives |
| Soggetto topico |
Social media and society - United States
Disinformation - Social aspects - United States Computer crimes - United States Veterans - Abuse of - United States Phishing - United States Computer crimes Phishing Social media and society |
| Soggetto genere / forma | Legislative materials. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Hijacking our heroes |
| Record Nr. | UNINA-9910715241003321 |
| Washington : , : U.S. Government Publishing Office, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
How not to get hooked by a 'phishing' scam [[electronic resource]]
| How not to get hooked by a 'phishing' scam [[electronic resource]] |
| Pubbl/distr/stampa | [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer & Business Education, , [2006] |
| Descrizione fisica | 3 unnumbered pages : digital, PDF file |
| Collana | FTC consumer alert |
| Soggetto topico |
Phishing
Internet fraud |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910696132203321 |
| [Washington, D.C.] : , : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer & Business Education, , [2006] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Phishing and countermeasures [[electronic resource] ] : understanding the increasing problem of electronic identity theft / / edited by Markus Jakobsson, Steven Myers
| Phishing and countermeasures [[electronic resource] ] : understanding the increasing problem of electronic identity theft / / edited by Markus Jakobsson, Steven Myers |
| Pubbl/distr/stampa | Hoboken, N.J., : Wiley-Interscience, c2007 |
| Descrizione fisica | 1 online resource (730 p.) |
| Disciplina |
005.9
364.163 |
| Altri autori (Persone) |
JakobssonMarkus
MyersSteven <1975-> |
| Soggetto topico |
Phishing
Identity theft - Prevention Computer security |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-280-82196-5
9786610821969 0-470-08610-6 0-470-08609-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Phishing and Countermeasures; CONTENTS; Preface; Acknowledgements; 1 Introduction to Phishing; 1.1 What is Phishing?; 1.2 A Brief History of Phishing; 1.3 The Costs to Society of Phishing; 1.4 A Typical Phishing Attack; 1.4.1 Phishing Example: America's Credit Unions; 1.4.2 Phishing Example: PayPal; 1.4.3 Making the Lure Convincing; 1.4.4 Setting The Hook; 1.4.5 Making the Hook Convincing; 1.4.6 The Catch; 1.4.7 Take-Down and Related Technologies; 1.5 Evolution of Phishing; 1.6 Case Study: Phishing on Froogle; 1.7 Protecting Users from Phishing; References
2 Phishing Attacks: Information Flow and Chokepoints2.1 Types of Phishing Attacks; 2.1.1 Deceptive Phishing; 2.1.2 Malware-Based Phishing; 2.1.3 DNS-Based Phishing ("Pharming"); 2.1.4 Content-Injection Phishing; 2.1.5 Man-in-the-Middle Phishing; 2.1.6 Search Engine Phishing; 2.2 Technology, Chokepoints, and Countermeasures; 2.2.1 Step 0: Preventing a Phishing Attack Before It Begins; 2.2.2 Step 1 : Preventing Delivery of Phishing Payload; 2.2.3 Step 2: Preventing or Disrupting a User Action; 2.2.4 Steps 2 and 4: Prevent Navigation and Data Compromise 2.2.5 Step 3: Preventing Transmission of the Prompt2.2.6 Step 4: Preventing Transmission of Confidential Information; 2.2.7 Steps 4 and 6: Preventing Data Entry and Rendering It Useless; 2.2.8 Step 5: Tracing Transmission of Compromised Credentials; 2.2.9 Step 6: Interfering with the Use of Compromised Information; 2.2.10 Step 7: Interfering with the Financial Benefit; References; 3 Spoofing and Countermeasures; 3.1 Email Spoofing; 3.1.1 Filtering; 3.1.2 Whitelisting and Greylisting; 3.1.3 Anti-spam Proposals; 3.1.4 User Education; 3.2 IP Spoofing; 3.2.1 IP Traceback 3.2.2 IP Spoofing Prevention3.2.3 Intradomain Spoofing; 3.3 Homograph Attacks Using Unicode; 3.3.1 Homograph Attacks; 3.3.2 Similar Unicode String Generation; 3.3.3 Methodology of Homograph Attack Detection; 3.4 Simulated Browser Attack; 3.4.1 Using the Illusion; 3.4.2 Web Spoofing; 3.4.3 SSL and Web Spoofing; 3.4.4 Ensnaring the User; 3.4.5 SpoofGuard Versus the Simulated Browser Attack; 3.5 Case Study: Warning the User About Active Web Spoofing; References; 4 Pharming and Client Side Attacks; 4.1 Malware; 4.1.1 Viruses and Worms; 4.1.2 Spyware; 4.1.3 Adware; 4.1.4 Browser Hijackers 4.1.5 Keyloggers4.1.6 Trojan Horses; 4.1.7 Rootkits; 4.1.8 Session Hijackers; 4.2 Malware Defense Strategies; 4.2.1 Defense Against Worms and Viruses; 4.2.2 Defense Against Spyware and Keyloggers; 4.2.3 Defense Against Rootkits; 4.3 Pharming; 4.3.1 Overview of DNS; 4.3.2 Role of DNS in Pharming; 4.3.3 Defense Against Pharming; 4.4 Case Study: Pharming with Appliances; 4.4.1 A Different Phishing Strategy; 4.4.2 The Spoof: A Home Pharming Appliance; 4.4.3 Sustainability of Distribution in the Online Marketplace; 4.4.4 Countermeasures; 4.5 Case Study: Race-Pharming; 4.5.1 Technical Description 4.5.2 Detection and Countermeasures |
| Record Nr. | UNINA-9910143417103321 |
| Hoboken, N.J., : Wiley-Interscience, c2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Phishing and countermeasures [[electronic resource] ] : understanding the increasing problem of electronic identity theft / / edited by Markus Jakobsson, Steven Myers
| Phishing and countermeasures [[electronic resource] ] : understanding the increasing problem of electronic identity theft / / edited by Markus Jakobsson, Steven Myers |
| Pubbl/distr/stampa | Hoboken, N.J., : Wiley-Interscience, c2007 |
| Descrizione fisica | 1 online resource (730 p.) |
| Disciplina |
005.9
364.163 |
| Altri autori (Persone) |
JakobssonMarkus
MyersSteven <1975-> |
| Soggetto topico |
Phishing
Identity theft - Prevention Computer security |
| ISBN |
1-280-82196-5
9786610821969 0-470-08610-6 0-470-08609-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Phishing and Countermeasures; CONTENTS; Preface; Acknowledgements; 1 Introduction to Phishing; 1.1 What is Phishing?; 1.2 A Brief History of Phishing; 1.3 The Costs to Society of Phishing; 1.4 A Typical Phishing Attack; 1.4.1 Phishing Example: America's Credit Unions; 1.4.2 Phishing Example: PayPal; 1.4.3 Making the Lure Convincing; 1.4.4 Setting The Hook; 1.4.5 Making the Hook Convincing; 1.4.6 The Catch; 1.4.7 Take-Down and Related Technologies; 1.5 Evolution of Phishing; 1.6 Case Study: Phishing on Froogle; 1.7 Protecting Users from Phishing; References
2 Phishing Attacks: Information Flow and Chokepoints2.1 Types of Phishing Attacks; 2.1.1 Deceptive Phishing; 2.1.2 Malware-Based Phishing; 2.1.3 DNS-Based Phishing ("Pharming"); 2.1.4 Content-Injection Phishing; 2.1.5 Man-in-the-Middle Phishing; 2.1.6 Search Engine Phishing; 2.2 Technology, Chokepoints, and Countermeasures; 2.2.1 Step 0: Preventing a Phishing Attack Before It Begins; 2.2.2 Step 1 : Preventing Delivery of Phishing Payload; 2.2.3 Step 2: Preventing or Disrupting a User Action; 2.2.4 Steps 2 and 4: Prevent Navigation and Data Compromise 2.2.5 Step 3: Preventing Transmission of the Prompt2.2.6 Step 4: Preventing Transmission of Confidential Information; 2.2.7 Steps 4 and 6: Preventing Data Entry and Rendering It Useless; 2.2.8 Step 5: Tracing Transmission of Compromised Credentials; 2.2.9 Step 6: Interfering with the Use of Compromised Information; 2.2.10 Step 7: Interfering with the Financial Benefit; References; 3 Spoofing and Countermeasures; 3.1 Email Spoofing; 3.1.1 Filtering; 3.1.2 Whitelisting and Greylisting; 3.1.3 Anti-spam Proposals; 3.1.4 User Education; 3.2 IP Spoofing; 3.2.1 IP Traceback 3.2.2 IP Spoofing Prevention3.2.3 Intradomain Spoofing; 3.3 Homograph Attacks Using Unicode; 3.3.1 Homograph Attacks; 3.3.2 Similar Unicode String Generation; 3.3.3 Methodology of Homograph Attack Detection; 3.4 Simulated Browser Attack; 3.4.1 Using the Illusion; 3.4.2 Web Spoofing; 3.4.3 SSL and Web Spoofing; 3.4.4 Ensnaring the User; 3.4.5 SpoofGuard Versus the Simulated Browser Attack; 3.5 Case Study: Warning the User About Active Web Spoofing; References; 4 Pharming and Client Side Attacks; 4.1 Malware; 4.1.1 Viruses and Worms; 4.1.2 Spyware; 4.1.3 Adware; 4.1.4 Browser Hijackers 4.1.5 Keyloggers4.1.6 Trojan Horses; 4.1.7 Rootkits; 4.1.8 Session Hijackers; 4.2 Malware Defense Strategies; 4.2.1 Defense Against Worms and Viruses; 4.2.2 Defense Against Spyware and Keyloggers; 4.2.3 Defense Against Rootkits; 4.3 Pharming; 4.3.1 Overview of DNS; 4.3.2 Role of DNS in Pharming; 4.3.3 Defense Against Pharming; 4.4 Case Study: Pharming with Appliances; 4.4.1 A Different Phishing Strategy; 4.4.2 The Spoof: A Home Pharming Appliance; 4.4.3 Sustainability of Distribution in the Online Marketplace; 4.4.4 Countermeasures; 4.5 Case Study: Race-Pharming; 4.5.1 Technical Description 4.5.2 Detection and Countermeasures |
| Record Nr. | UNINA-9910830161303321 |
| Hoboken, N.J., : Wiley-Interscience, c2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Phishing and countermeasures : understanding the increasing problem of electronic identity theft / / edited by Markus Jakobsson, Steven Myers
| Phishing and countermeasures : understanding the increasing problem of electronic identity theft / / edited by Markus Jakobsson, Steven Myers |
| Pubbl/distr/stampa | Hoboken, N.J., : Wiley-Interscience, c2007 |
| Descrizione fisica | 1 online resource (730 p.) |
| Disciplina | 364.16/3 |
| Altri autori (Persone) |
JakobssonMarkus
MyersSteven <1975-> |
| Soggetto topico |
Phishing
Identity theft - Prevention Computer security |
| ISBN |
9786610821969
9781280821967 1280821965 9780470086100 0470086106 9780470086094 0470086092 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Phishing and Countermeasures; CONTENTS; Preface; Acknowledgements; 1 Introduction to Phishing; 1.1 What is Phishing?; 1.2 A Brief History of Phishing; 1.3 The Costs to Society of Phishing; 1.4 A Typical Phishing Attack; 1.4.1 Phishing Example: America's Credit Unions; 1.4.2 Phishing Example: PayPal; 1.4.3 Making the Lure Convincing; 1.4.4 Setting The Hook; 1.4.5 Making the Hook Convincing; 1.4.6 The Catch; 1.4.7 Take-Down and Related Technologies; 1.5 Evolution of Phishing; 1.6 Case Study: Phishing on Froogle; 1.7 Protecting Users from Phishing; References
2 Phishing Attacks: Information Flow and Chokepoints2.1 Types of Phishing Attacks; 2.1.1 Deceptive Phishing; 2.1.2 Malware-Based Phishing; 2.1.3 DNS-Based Phishing ("Pharming"); 2.1.4 Content-Injection Phishing; 2.1.5 Man-in-the-Middle Phishing; 2.1.6 Search Engine Phishing; 2.2 Technology, Chokepoints, and Countermeasures; 2.2.1 Step 0: Preventing a Phishing Attack Before It Begins; 2.2.2 Step 1 : Preventing Delivery of Phishing Payload; 2.2.3 Step 2: Preventing or Disrupting a User Action; 2.2.4 Steps 2 and 4: Prevent Navigation and Data Compromise 2.2.5 Step 3: Preventing Transmission of the Prompt2.2.6 Step 4: Preventing Transmission of Confidential Information; 2.2.7 Steps 4 and 6: Preventing Data Entry and Rendering It Useless; 2.2.8 Step 5: Tracing Transmission of Compromised Credentials; 2.2.9 Step 6: Interfering with the Use of Compromised Information; 2.2.10 Step 7: Interfering with the Financial Benefit; References; 3 Spoofing and Countermeasures; 3.1 Email Spoofing; 3.1.1 Filtering; 3.1.2 Whitelisting and Greylisting; 3.1.3 Anti-spam Proposals; 3.1.4 User Education; 3.2 IP Spoofing; 3.2.1 IP Traceback 3.2.2 IP Spoofing Prevention3.2.3 Intradomain Spoofing; 3.3 Homograph Attacks Using Unicode; 3.3.1 Homograph Attacks; 3.3.2 Similar Unicode String Generation; 3.3.3 Methodology of Homograph Attack Detection; 3.4 Simulated Browser Attack; 3.4.1 Using the Illusion; 3.4.2 Web Spoofing; 3.4.3 SSL and Web Spoofing; 3.4.4 Ensnaring the User; 3.4.5 SpoofGuard Versus the Simulated Browser Attack; 3.5 Case Study: Warning the User About Active Web Spoofing; References; 4 Pharming and Client Side Attacks; 4.1 Malware; 4.1.1 Viruses and Worms; 4.1.2 Spyware; 4.1.3 Adware; 4.1.4 Browser Hijackers 4.1.5 Keyloggers4.1.6 Trojan Horses; 4.1.7 Rootkits; 4.1.8 Session Hijackers; 4.2 Malware Defense Strategies; 4.2.1 Defense Against Worms and Viruses; 4.2.2 Defense Against Spyware and Keyloggers; 4.2.3 Defense Against Rootkits; 4.3 Pharming; 4.3.1 Overview of DNS; 4.3.2 Role of DNS in Pharming; 4.3.3 Defense Against Pharming; 4.4 Case Study: Pharming with Appliances; 4.4.1 A Different Phishing Strategy; 4.4.2 The Spoof: A Home Pharming Appliance; 4.4.3 Sustainability of Distribution in the Online Marketplace; 4.4.4 Countermeasures; 4.5 Case Study: Race-Pharming; 4.5.1 Technical Description 4.5.2 Detection and Countermeasures |
| Record Nr. | UNINA-9911019295503321 |
| Hoboken, N.J., : Wiley-Interscience, c2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||