Garcia et al. - Google Patents
How to Defend against Identity Theft, Phishing, and Web SpoofingGarcia et al.
View PDF- Document ID
- 8151097591704052311
- Author
- Garcia M
- Dirks M
- Weatherston M
External Links
Snippet
Identity theft is an attractive activity for cyber-criminals. Every day, many people are victim of one of the many cyber-traps resulting in millions of dollars lost. People victim of these crimes suffer terrible consequences trying to clear their names. Hundreds or even thousands of …
- 230000000694 effects 0 abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Vayansky et al. | Phishing–challenges and solutions | |
Milletary et al. | Technical trends in phishing attacks | |
Herzberg et al. | Security and identification indicators for browsers against spoofing and phishing attacks | |
Dhamija et al. | The battle against phishing: Dynamic security skins | |
US8079087B1 (en) | Universal resource locator verification service with cross-branding detection | |
CA2653633C (en) | Security system and method for establishing and regulating secure communications over a network | |
US7958555B1 (en) | Protecting computer users from online frauds | |
US8286225B2 (en) | Method and apparatus for detecting cyber threats | |
US20080201401A1 (en) | Secure server authentication and browsing | |
US20060070126A1 (en) | A system and methods for blocking submission of online forms. | |
JP2006313517A (en) | Safety on internet | |
Herzberg | Why Johnny can't surf (safely)? Attacks and defenses for web users | |
Purkait | Examining the effectiveness of phishing filters against DNS based phishing attacks | |
WO2005091107A1 (en) | Security component for use with an internet browser application and method and apparatus associated therewith | |
Herzberg et al. | Protecting (even) Naive Web Users, or: preventing spoofing and establishing credentials of web sites | |
Yue | Preventing the Revealing of Online Passwords to Inappropriate Websites with {LoginInspector} | |
Debnath et al. | A comprehensive survey on mobile browser security issues, challenges and solutions | |
Teichmann et al. | Phishing attacks: risks and challenges for law firms | |
Abdulla et al. | Consumer use of E-banking in Iraq: Security breaches and offered solution | |
Belghith | Investigation on e-commerce platforms for tackling e-business security challenge. | |
Bhati et al. | Prevention approach of phishing on different websites | |
Garcia et al. | How to Defend against Identity Theft, Phishing, and Web Spoofing | |
Mihai | Overview on phishing attacks | |
Singh et al. | A literature survey on anti-phishing browser extensions | |
Purkait | Preventing Phishing Attacks with Virtual Browser Extension. |