Abstract
Sometimes a "friendly" email message tempts recipients to reveal more online than they otherwise would, playing right into the sender's hand.
Supplemental Material
Available for Download
Requires Asian Language Support in Adobe Reader And Japanese Language Support in your Browser
- Adamic, L.A. and Adar, E. Friends and neighbors on the Web. Social Networks 25, 3 (July 2003), 211--230.Google Scholar
Cross Ref
- Chou, N. Ledesma, R., Teraguchi, Y., Boneh, D., and Mitchell, J.C. Client-side defense against Web-based identity theft. In Proceedings of the 11th Annual Network and Distributed System Security Symposium. (Feb. 2004).Google Scholar
- Dhamija, R. and Tygar, J.D. The battle against phishing: Dynamic security skins. In Proceedings of the ACM Symposium on Usable Security and Privacy. (2005), 77--88. Google Scholar
Digital Library
- Emigh, A. Online identity theft: Phishing technology, chokepoints and countermeasures. ITTC Report on Online Identity Theft Technology and Countermeaures (Oct. 2005); www.anti-phishing.org/Phishing-dhs-report.pdf.Google Scholar
- Ferguson, A.J. Fostering e-mail security awareness: The West Point carronade. Educause Quarterly 28, 1 (2005).Google Scholar
- Finn, P. and Jakobsson, M. Designing and conducting phishing experiments. IEEE Technology and Society Magazine, Special Issue on Usability and Security (2005).Google Scholar
- Garfinkel, S. and Miller, R. Johnny 2: A user test of key continuity management with s/mime and outlook express. Presented at the Symposium on Usable Privacy and Security (July 6--8, 2005, Pittsburgh, PA). Google Scholar
Digital Library
- Griffith, V. and Jakobsson, M. Messin' with Texas: Deriving mother's maiden names using public records. RSA CryptoBytes 8, 1 (2006).Google Scholar
- Gartner Group. Gartner study finds significant increase in e-mail phishing attacks (Apr. 2004); www.gartner.com/5_about/press_releases/asset_71087_11.jsp, April 2004.Google Scholar
- Jakobsson, M. Modeling and preventing phishing attacks. In Phishing Panel at Financial Cryptography. Feb. 2005. Google Scholar
Digital Library
- Jakobsson, M. and Myers, S. Phishing and Counter-Measures. John Wiley and Sons, 2006. Google Scholar
Digital Library
- Jakobsson, M. and Stamm, S. Invasive browser sniffing and countermeasures. In WWW `06: Proceedings of the 15th International Conference on World Wide Web. ACM Press, NY, 2006, 523--532. Google Scholar
Digital Library
Index Terms
Social phishing
Recommendations
A Sender-Centric Approach to Detecting Phishing Emails
Email-based online phishing is a critical security threat on the Internet. Although phishers have great flexibility in manipulating both the content and structure of phishing emails, phishers have much less flexibility in completely concealing the ...
How Experts Detect Phishing Scam Emails
Phishing scam emails are emails that pretend to be something they are not in order to get the recipient of the email to undertake some action they normally would not. While technical protections against phishing reduce the number of phishing emails ...






Comments