dc.contributor.author |
Grobler, MM
|
|
dc.date.accessioned |
2010-11-11T12:10:08Z |
|
dc.date.available |
2010-11-11T12:10:08Z |
|
dc.date.issued |
2010-08 |
|
dc.identifier.citation |
Grobler, MM. 2010. Phishing for fortune. 2010 Information Security for South Africa conference. Sandton, South Africa, 2 - 4 August 2010, pp 8 |
en |
dc.identifier.isbn |
978-1-4244-5494-5 |
|
dc.identifier.uri |
http://hdl.handle.net/10204/4553
|
|
dc.description |
2010 Information Security for South Africa conference. Sandton, South Africa, 2 - 4 August 2010 |
en |
dc.description.abstract |
Phishing is an attempt by a third party to solicit confidential information from an individual, group or organization. Phishers attempt to trick users into disclosing personal data, such as credit card numbers, online banking credentials and other sensitive information, which they may then use to commit fraudulent acts. There has been an increase in attack diversity and technical sophistication by people conducting phishing and online financial fraud, making it necessary for Internet users to be aware of new trends. This article presents a holistic view of the cyber criminal attack type phishing. It presents a brief history of phishing, explains how phishing works, as well as variations on the attack type and real-life examples. |
en |
dc.language.iso |
en |
en |
dc.relation.ispartofseries |
Conference Paper |
en |
dc.subject |
Phishing |
en |
dc.subject |
Man in the middle |
en |
dc.subject |
Cross site scripting |
en |
dc.subject |
URL obfuscation |
en |
dc.subject |
Cyber criminal |
en |
dc.title |
Phishing for fortune |
en |
dc.type |
Conference Presentation |
en |
dc.identifier.apacitation |
Grobler, M. (2010). Phishing for fortune. http://hdl.handle.net/10204/4553 |
en_ZA |
dc.identifier.chicagocitation |
Grobler, MM. "Phishing for fortune." (2010): http://hdl.handle.net/10204/4553 |
en_ZA |
dc.identifier.vancouvercitation |
Grobler M, Phishing for fortune; 2010. http://hdl.handle.net/10204/4553 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Grobler, MM
AB - Phishing is an attempt by a third party to solicit confidential information from an individual, group or organization. Phishers attempt to trick users into disclosing personal data, such as credit card numbers, online banking credentials and other sensitive information, which they may then use to commit fraudulent acts. There has been an increase in attack diversity and technical sophistication by people conducting phishing and online financial fraud, making it necessary for Internet users to be aware of new trends. This article presents a holistic view of the cyber criminal attack type phishing. It presents a brief history of phishing, explains how phishing works, as well as variations on the attack type and real-life examples.
DA - 2010-08
DB - ResearchSpace
DP - CSIR
KW - Phishing
KW - Man in the middle
KW - Cross site scripting
KW - URL obfuscation
KW - Cyber criminal
LK - https://researchspace.csir.co.za
PY - 2010
SM - 978-1-4244-5494-5
T1 - Phishing for fortune
TI - Phishing for fortune
UR - http://hdl.handle.net/10204/4553
ER -
|
en_ZA |