Source Code Block to Bring Down Phishing Attacks
Cyber-attacks are the attacks carried out mainly over the internet and victims being the internet users. Phishing is a malicious activity aimed at collecting sensitive user information, by recreating an environment that has similarity in functionalities and appearance to the one that manages this information. Phishing most commonly occurs on the Web and mainly initiated via an email where the user is redirected to a malicious website that is a copy of the legitimate website and the objective of which is to capture the information to impersonate the user on the original Website and access the user’s personal confidential data. Seeing the truth here we suggest a preventive anti-phishing technique to keep the users away from to be victims of phishing attacks.
PhishMe Report - https://www.darkreading. com/endpoint /91-- of - cyberattacks - start - with -a-phishing-email/d/d-id/1327704?.
A Machine - Learning Approach to Phishing Detection and Defense - Iraj Sadegh Amiri, O.A. Akanbi, E. Fazeldehkordi.
GoldPhish - Cyber Risk Management Solutions https://goldphish.com/.
Anti-phishing Extension for Google Chrome https //www.theverge.com/2015/4/29/8513123/ phishing-password-alert-google-chrome-extension.
Netcraft. Netcraft anti-phishing tool bar. http://toolbar.netcraft.com/.
Wu, M., R. C. Miller and S. L. Garfinkel. 2006. Do Security Toolbars Actually Prevent Phishing Attacks? In the Conference on Human Factors in Computing Systems. http: //www.simson.net/ref/2006/CHI-security-toolbarfinal.pdf.
Large-Scale Automatic Classification of Phishing Pages, Colin Whittaker, Brian Ryner and Marria Nazif.
Fette, I., N. Sadeh and A. Tomasic. Learning to Detect Phishing Emails. 2006. ISRI Technical report, CMU-ISRI- 06-112. Retrieved Sep 2, 2006, http://reportsarchive. adm.cs.cmu.edu/anon/isri2006 /CMU-ISRI-06-112.pdf.
Phishing Attacks 2017 - https://www.info security-magazine.com /opinions /why-2017-phishing-attacks-teach/.
Notable Phishing Scams - http://resources. infosecinstitute.com /top-ten-phishing-scams/# gref.
R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In Proceedings of the SIGCHI conference on Human Factors in computing systems, ACM, 2006.
Microsoft-ASSOCHAM survey - https:// economictimes. indiatimes.com / tech/ites/bpo - firms - lack-seriousness - on - cyber - fraud - threats-assocham-microsoft-survey/articleshow / 63529636.cms
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.