Herzberg et al., 2004 - Google Patents
Trustbar: Protecting (even naive) web users from spoofing and phishing attacksHerzberg et al., 2004
View PDF- Document ID
- 618230606336230280
- Author
- Herzberg A
- Gbara A
- Publication year
External Links
Snippet
In spite of the use of standard web security measures (SSL/TLS), users often fail to detectspoofedweb forms, and enter into them sensitive information such as passwords. Furthermore, users often access the spoofed sites by following a link sent to them in a …
- 230000002633 protecting 0 title description 48
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Herzberg et al. | Trustbar: Protecting (even naive) web users from spoofing and phishing attacks | |
| Herzberg et al. | Security and identification indicators for browsers against spoofing and phishing attacks | |
| Ramzan | Phishing attacks and countermeasures | |
| Sotirov et al. | MD5 considered harmful today | |
| Jakobsson | The human factor in phishing | |
| Pande | Introduction to cyber security | |
| Herzberg et al. | Protecting (even) Naive Web Users, or: preventing spoofing and establishing credentials of web sites | |
| Sengupta et al. | e-Commerce security—A life cycle approach | |
| Bose et al. | Unveiling the mask of phishing: Threats, preventive measures, and responsibilities | |
| Falk et al. | Analyzing websites for user-visible security design flaws | |
| Alghenaim et al. | Awareness of phishing attacks in the public sector: Review types and technical approaches | |
| Debnath et al. | A comprehensive survey on mobile browser security issues, challenges and solutions | |
| Jøsang et al. | Trust management for e-commerce | |
| Herzberg et al. | Security and identification indicators for browsers against spoofing and phishing attacks | |
| Hegt | Analysis of current and future phishing attacks on internet banking services | |
| Al-Dwairi et al. | Business-to-consumer e-commerce Web Sites: Vulnerabilities, Threats and quality evaluation model | |
| Reuvid | The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity | |
| Crispo et al. | WWW security and trusted third party services | |
| Mihai | Overview on phishing attacks | |
| Hallam-Baker | Prevention strategies for the next wave of cyber crime | |
| Jackson | Improving browser security policies | |
| Khadilkar | Securing Internet Banking Against Data Phishing Using Cryptography | |
| Pac | Phishing threats, attack vectors, and mitigation | |
| Kolagotla | Enhancing the security of an E-mail by DMARC and DNS data | |
| Sullivan | The Shortcut Guide to Extended Validation SSL Certificates |