Harley et al., 2007 - Google Patents
Phish phodder: is user education helping or hindering?Harley et al., 2007
View PDF- Document ID
- 10992964214529326749
- Author
- Harley D
- Lee A
- Publication year
- Publication venue
- Virus Bulletin Conference Proceedings
External Links
Snippet
Mostly, security professionals can spot a phish a mile off. If they do err, it's usually on the side of caution, for instance when real organizations fail to observe best practice and generate phish-like marketing messages. Many sites are now addressing the problem with …
- 238000003339 Best practice 0 abstract description 4
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jakobsson | The human factor in phishing | |
Purkait | Phishing counter measures and their effectiveness–literature review | |
Hong | The state of phishing attacks | |
US8713677B2 (en) | Anti-phishing system and method | |
Furnell | Phishing: can we spot the signs? | |
Dixon et al. | Holding your hand on the danger Button: observing user phish detection strategies across Mobile and desktop | |
Nisha et al. | Business E-mail compromise—techniques and countermeasures | |
Harley et al. | Phish phodder: is user education helping or hindering? | |
US8443192B2 (en) | Network security method | |
Chuchuen et al. | Relationship between phishing techniques and user personality model of Bangkok Internet users | |
Bailey et al. | Analysis of student vulnerabilities to phishing | |
Hegt | Analysis of current and future phishing attacks on internet banking services | |
Qasaimeh et al. | Status update on phishing emails awareness: Jordanian case | |
Harley et al. | Is user education helping or hindering? | |
Harley et al. | A pretty kettle of phish | |
Bhardwaj et al. | Types of hacking attack and their countermeasure | |
Utakrit | Security awareness by online banking users in Western Australian of phishing attacks | |
McAnulty | Phishing Attacks: A Plan to Educate Employees and Mitigate Risks | |
Mehendele et al. | Review of Phishing Attacks and Anti Phishing Tools | |
Sigurdsson et al. | METHODS FOR DETECTING PHISHING ATTACKS | |
Mihai | Overview on phishing attacks | |
Mustonen | Phishing in email and instant messaging | |
Movassagh | Awareness and Perception of Phishing variants from Policing, Computing and Criminology students in Canterbury Christ Church University | |
HAZAM | Extending Zero Trust to the End-User Ecosystem. | |
Ceesay | Mitigating phishing attacks: a detection, response and evaluation framework |