共 50 条
Phishing mongers and posers
被引:9
|作者:
Berghel, H
[1
]
机构:
[1] Univ Nevada, Howard R Hughes Coll Engn, Las Vegas, NV 89154 USA
[2] Univ Nevada, Ctr Cybermedia Res, Las Vegas, NV 89154 USA
[3] Ident Theft & Financial Fraud Res & Operat Ctr, Las Vegas, NV USA
关键词:
(Edited Abstract);
D O I:
10.1145/1121949.1121968
中图分类号:
TP3 [计算技术、计算机技术];
学科分类号:
0812 ;
摘要:
The role played by mongers and posers in phishing attacks while stealing customers' personal identity data and financial account credentials is discussed. The essential requirements of effective phishing need to present itself to an appropriate target-of-opportunity, satisfy the reasonableness condition, and cause the unwary to suspend any disbelief. Phish mongers deploy phish scams in such a way that they stand a measurable chance of success against a reasonably intelligent and enlightened end user. They design web sites to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords, and social security numbers. Phising is economically motivated by mongers, that are ultimately born by the customers.
引用
收藏
页码:21 / 25
页数:5
相关论文