skip to main content
article

In-Session Phishing: In-session phishing and knowing your enemy

Published:01 March 2009Publication History
Skip Abstract Section

Abstract

The proliferation of underground forums for trading stolen personal information is fuelling the automation of identity theft and the creation and distribution of crimeware. This commercialisation of fraud is driven by well-organised, powerful fraud rings, which have emerged to capitalise on the opportunity and thrive in the anonymity the online world provides.

References

  1. Microsoft Security Bulletin MS08- 067, Microsoft, October 23 2008. ¿www.microsoft.com/technet/security/ Bulletin/MS08-067.mspx¿Google ScholarGoogle Scholar

Index Terms

  1. In-Session Phishing: In-session phishing and knowing your enemy
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Network Security
        Network Security  Volume 2009, Issue 3
        March, 2009
        26 pages

        Copyright © Elsevier Ltd © 2009

        Publisher

        Elsevier Science Publishers B. V.

        Netherlands

        Publication History

        • Published: 1 March 2009

        Qualifiers

        • article