[go: up one dir, main page]

Herzberg et al., 2004 - Google Patents

Trustbar: Protecting (even naive) web users from spoofing and phishing attacks

Herzberg et al., 2004

View PDF
Document ID
618230606336230280
Author
Herzberg A
Gbara A
Publication year

External Links

Snippet

In spite of the use of standard web security measures (SSL/TLS), users often fail to detectspoofedweb forms, and enter into them sensitive information such as passwords. Furthermore, users often access the spoofed sites by following a link sent to them in a …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Herzberg et al. Trustbar: Protecting (even naive) web users from spoofing and phishing attacks
Herzberg et al. Security and identification indicators for browsers against spoofing and phishing attacks
Ramzan Phishing attacks and countermeasures
Sotirov et al. MD5 considered harmful today
Jakobsson The human factor in phishing
Pande Introduction to cyber security
Herzberg et al. Protecting (even) Naive Web Users, or: preventing spoofing and establishing credentials of web sites
Sengupta et al. e-Commerce security—A life cycle approach
Bose et al. Unveiling the mask of phishing: Threats, preventive measures, and responsibilities
Falk et al. Analyzing websites for user-visible security design flaws
Alghenaim et al. Awareness of phishing attacks in the public sector: Review types and technical approaches
Debnath et al. A comprehensive survey on mobile browser security issues, challenges and solutions
Jøsang et al. Trust management for e-commerce
Herzberg et al. Security and identification indicators for browsers against spoofing and phishing attacks
Hegt Analysis of current and future phishing attacks on internet banking services
Al-Dwairi et al. Business-to-consumer e-commerce Web Sites: Vulnerabilities, Threats and quality evaluation model
Reuvid The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity
Crispo et al. WWW security and trusted third party services
Mihai Overview on phishing attacks
Hallam-Baker Prevention strategies for the next wave of cyber crime
Jackson Improving browser security policies
Khadilkar Securing Internet Banking Against Data Phishing Using Cryptography
Pac Phishing threats, attack vectors, and mitigation
Kolagotla Enhancing the security of an E-mail by DMARC and DNS data
Sullivan The Shortcut Guide to Extended Validation SSL Certificates