[go: up one dir, main page]

Harley et al., 2007 - Google Patents

Phish phodder: is user education helping or hindering?

Harley et al., 2007

View PDF
Document ID
10992964214529326749
Author
Harley D
Lee A
Publication year
Publication venue
Virus Bulletin Conference Proceedings

External Links

Snippet

Mostly, security professionals can spot a phish a mile off. If they do err, it's usually on the side of caution, for instance when real organizations fail to observe best practice and generate phish-like marketing messages. Many sites are now addressing the problem with …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Jakobsson The human factor in phishing
Purkait Phishing counter measures and their effectiveness–literature review
Hong The state of phishing attacks
US8713677B2 (en) Anti-phishing system and method
Furnell Phishing: can we spot the signs?
Dixon et al. Holding your hand on the danger Button: observing user phish detection strategies across Mobile and desktop
Nisha et al. Business E-mail compromise—techniques and countermeasures
Harley et al. Phish phodder: is user education helping or hindering?
US8443192B2 (en) Network security method
Chuchuen et al. Relationship between phishing techniques and user personality model of Bangkok Internet users
Bailey et al. Analysis of student vulnerabilities to phishing
Hegt Analysis of current and future phishing attacks on internet banking services
Qasaimeh et al. Status update on phishing emails awareness: Jordanian case
Harley et al. Is user education helping or hindering?
Harley et al. A pretty kettle of phish
Bhardwaj et al. Types of hacking attack and their countermeasure
Utakrit Security awareness by online banking users in Western Australian of phishing attacks
McAnulty Phishing Attacks: A Plan to Educate Employees and Mitigate Risks
Mehendele et al. Review of Phishing Attacks and Anti Phishing Tools
Sigurdsson et al. METHODS FOR DETECTING PHISHING ATTACKS
Mihai Overview on phishing attacks
Mustonen Phishing in email and instant messaging
Movassagh Awareness and Perception of Phishing variants from Policing, Computing and Criminology students in Canterbury Christ Church University
HAZAM Extending Zero Trust to the End-User Ecosystem.
Ceesay Mitigating phishing attacks: a detection, response and evaluation framework