釣魚 (網絡)

出自維基百科,自由嘅百科全書
(由網絡釣魚跳轉過來)
Jump to navigation Jump to search

References[編輯]

  1. Jakobsson, Markus. "The Human Factor of Phishing" (PDF). Privacy & Security of Consumer Information '07. 喺February 2搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  2. Tan, Koon. "Phishing and Spamming via IM (SPIM)". Internet Storm Center. 喺Dec 5搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  3. Skoudis, Ed (June 13, 2006). "Phone phishing: The role of VoIP in phishing attacks". searchSecurity.
  4. ""phish, v." OED Online, March 2006, Oxford University Press". Oxford English Dictionary Online. 喺Aug 9搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  5. Ollmann, Gunter. "The Phishing Guide: Understanding and Preventing Phishing Attacks". Technical Info. 喺Jul 10搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  6. Felix, Jerry and Hauck, Chris (September 1987). "System Security: A Hacker's Perspective". 1987 Interex Proceedings. 1: 6.CS1 maint: multiple names: 作者名單 (link)
  7. "Spam Slayer: Do You Speak Spam?". PCWorld.com. 喺Aug 16搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  8. ""phishing, n." OED Online, March 2006, Oxford University Press". Oxford English Dictionary Online. 喺Aug 9搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  9. "Phishing". Language Log, September 22, 2004. 喺Aug 9搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  10. Mitchell, Anthony (July 12, 2005). "A Leet Primer". TechNewsWorld.
  11. "Know your Enemy: Phishing". The Honeynet Project & Research Alliance. 喺Jul 8搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  12. "Phishing". Word Spy. 喺Sep 28搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  13. Stutz, Michael (January 29, 1998). "AOL: A Cracker's Paradise?". Wired News.
  14. "History of AOL Warez". 喺Sep 28搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  15. "GP4.3 - Growth and Fraud - Case #3 - Phishing". Financial Cryptography. Dec 30, 2005.
  16. "In 2005, Organized Crime Will Back Phishers". IT Management. Dec 23, 2004.
  17. "The economy of phishing: A survey of the operations of the phishing market". First Monday. Sep 2005.
  18. "Suspicious e-Mails and Identity Theft". Internal Revenue Service. 喺Jul 5搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  19. "Phishing for Clues". Indiana University Bloomington. September 15, 2005.
  20. "What is spear phishing?". Microsoft Security At Home. 喺Jul 10搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  21. Kirk, Jeremy (June 02, 2006). "Phishing Scam Takes Aim at MySpace.com". IDG Network. Check date values in: |date= (help)
  22. "Malicious Website / Malicious Code: MySpace XSS QuickTime Worm". Websense Security Labs. 喺Dec 5搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  23. Tom Jagatic and Nathan Johnson and Markus Jakobsson and Filippo Menczer. "Social Phishing" (PDF). To appear in the CACM (Oct 2007). 喺Jun 3搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  24. Berners-Lee, Tim. "Uniform Resource Locators (URL)". IETF Network Working Group. 喺January 28搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  25. Microsoft. "A security update is available that modifies the default behavior of Internet Explorer for handling user information in HTTP and in HTTPS URLs". Microsoft Knowledgebase. 喺August 28搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  26. Fisher, Darin. "Warn when HTTP URL auth information isn't necessary or when it's provided". Bugzilla. 喺August 28搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  27. Johanson, Eric. "The State of Homograph Attacks Rev1.1". The Shmoo Group. 喺August 11搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  28. Evgeniy Gabrilovich and Alex Gontmakher (February 2002). "The Homograph Attack" (PDF). Communications of the ACM. 45(2): 128.
  29. Leyden, John (August 15, 2006). "Barclays scripting SNAFU exploited by phishers". The Register.
  30. Levine, Jason. "Goin' phishing with eBay". Q Daily News. 喺December 14搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  31. Mutton, Paul. "Phishing Web Site Methods". FraudWatch International. 喺December 14搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  32. "Phishing con hijacks browser bar". BBC News. April 8, 2004.
  33. Krebs, Brian. "Flaws in Financial Sites Aid Scammers". Security Fix. 喺June 28搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  34. Mutton, Paul. "PayPal Security Flaw allows Identity Theft". Netcraft. 喺June 19搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  35. Hoffman, Patrick (January 10, 2007). "RSA Catches Financial Phishing Kit". eWeek.
  36. Gonsalves, Antone (April 25, 2006). "Phishers Snare Victims With VoIP". Techweb.
  37. "Identity thieves take advantage of VoIP". Silicon.com. March 21, 2005.
  38. Mutton, Paul. "Fraudsters seek to make phishing sites undetectable by content filters". Netcraft. 喺Jul 10搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  39. Virgil Griffith and Markus Jakobsson. "Messin' with Texas, Deriving Mother's Maiden Names Using Public Records" (PDF). ACNS '05. 喺Jul 7搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  40. Krebs, Brian (November 18, 2004). "Phishing Schemes Scar Victims". washingtonpost.com.
  41. Kerstein, Paul (July 19, 2005). "How Can We Stop Phishing and Pharming Scams?". CSO.
  42. "UK phishing fraud losses double". Finextra. March 07, 2006. Check date values in: |date= (help)
  43. Richardson, Tim (May 3, 2005). "Brits fall prey to phishing". The Register.
  44. Miller, Rich. "Bank, Customers Spar Over Phishing Losses". Netcraft. 喺Dec 14搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  45. http://applications.boi.com/updates/Article?PR_ID=1430
  46. http://www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks
  47. Ponnurangam Kumaraguru, Yong Woo Rhee, Alessandro Acquisti, Lorrie Cranor, Jason Hong and Elizabeth Nunge. (November 2006.). "Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System" (PDF). Technical Report CMU-CyLab-06-017, CyLab, Carnegie Mellon University. 喺Nov 14搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate=, |date= (help)CS1 maint: multiple names: 作者名單 (link)
  48. Bank, David (August 17, 2005). "'Spear Phishing' Tests Educate People About Online Scams". The Wall Street Journal.
  49. "Anti-Phishing Tips You Should Not Follow". HexView. 喺June 19搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  50. "Protect Yourself from Fraudulent Emails". PayPal. 喺July 07搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  51. Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevis, Youn-kyung Lim. "What Instills Trust? A Qualitative Study of Phishing" (PDF). USEC '06.CS1 maint: multiple names: 作者名單 (link)
  52. Zeltser, Lenny (March 17, 2006). "Phishing Messages May Include Highly-Personalized Information". The SANS Institute.
  53. Markus Jakobsson and Jacob Ratkiewicz. "Designing Ethical Phishing Experiments" (PDF). WWW '06.
  54. Kawamoto, Dawn (August 4, 2005). "Faced with a rise in so-called pharming and crimeware attacks, the Anti-Phishing Working Group will expand its charter to include these emerging threats". ZDNet India.
  55. Brandt, Andrew. "Privacy Watch: Protect Yourself With an Antiphishing Toolbar". PC World - Privacy Watch. 喺Sep 25搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  56. Franco, Rob. "Better Website Identification and Extended Validation Certificates in IE7 and Other Browsers". IEBlog. 喺May 20搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  57. "Bon Echo Anti-Phishing". Mozilla. 喺June 02搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  58. "Gone Phishing: Evaluating Anti-Phishing Tools for Windows". 3Sharp. September 27, 2006. 喺October 20搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  59. "Two Things That Bother Me About Google's New Firefox Extension". Nitesh Dhanjani on O'Reilly ONLamp. 喺July 01搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  60. "Firefox 2 Phishing Protection Effectiveness Testing". 喺January 23搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  61. Higgins, Kelly Jackson. "DNS Gets Anti-Phishing Hook". Dark Reading. 喺October 8搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  62. Krebs, Brian (August 31, 2006). "Using Images to Fight Phishing". Security Fix.
  63. Seltzer, Larry (August 2, 2004). "Spotting Phish and Phighting Back". eWeek.
  64. Bank of America. "How Bank of America SiteKey Works For Online Banking Security". 喺January 23搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  65. Brubaker, Bill (July 14, 2005). "Bank of America Personalizes Cyber-Security". Washington Post.
  66. Stone, Brad (February 5, 2007). "Study Finds Web Antifraud Measure Ineffective". New York Times. 喺February 5搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  67. Stuart Schechter, Rachna Dhamija, Andy Ozment, Ian Fischer (May, 2007). "The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies" (PDF). IEEE Symposium on Security and Privacy, May 2007. 喺February 5搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate=, |date= (help)CS1 maint: multiple names: 作者名單 (link)
  68. "Phishers target Nordea's one-time password system". Finextra. October 12, 2005.
  69. Krebs, Brian (July 10, 2006). "Citibank Phish Spoofs 2-Factor Authentication". Security Fix.
  70. Schneier, Bruce. "Security Skins". Schneier on Security. 喺December 3搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  71. Rachna Dhamija, J.D. Tygar (July, 2005). "The Battle Against Phishing: Dynamic Security Skins" (PDF). Symposium On Usable Privacy and Security (SOUPS) 2005. 喺February 5搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate=, |date= (help)
  72. Ian Fette, Norman Sadeh, Anthony Tomasic (June 2006). "Learning to Detect Phishing Emails" (PDF). Carnegie Mellon University Technical Report CMU-ISRI-06-112.CS1 maint: multiple names: 作者名單 (link)
  73. "Anti-Phishing Working Group: Vendor Solutions". Anti-Phishing Working Group. 喺July 06搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  74. McMillan, Robert (March 28, 2006). "New sites let users find and report phishing". LinuxWorld.
  75. "PhishTank - A New Collaborative Phishing Workgroup". limited-exposure. 喺Oct 03搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  76. Legon, Jeordan (January 26, 2004). "'Phishing' scams reel in your identity". CNN.
  77. Leyden, John (March 21, 2005). "Brazilian cops net 'phishing kingpin'". The Register.
  78. Roberts, Paul (June 27, 2005). "UK Phishers Caught, Packed Away". eWEEK.
  79. "Nineteen Individuals Indicted in Internet 'Carding' Conspiracy". 喺November 20搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  80. "8 held over suspected phishing fraud". The Daily Yomiuri. May 31, 2006.
  81. "Phishing gang arrested in USA and Eastern Europe after FBI investigation". 喺December 14搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  82. "Phishers Would Face 5 Years Under New Bill". Information Week. March 2, 2005.
  83. "Fraud Act 2006". 喺December 14搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  84. "Prison terms for phishing fraudsters". The Register. November 14, 2006.
  85. "Microsoft Partners with Australian Law Enforcement Agencies to Combat Cyber Crime". 喺August 24搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  86. Espiner, Tom (March 20, 2006). "Microsoft launches legal assault on phishers". ZDNet.
  87. Leyden, John (November 23, 2006). "MS reels in a few stray phish". The Register.
  88. "Overview of AOL anti-phishing activities". 喺March 08搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  89. "AOL Takes Fight Against Identity Theft To Court, Files Lawsuits Against Three Major Phishing Gangs". 喺March 08搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  90. "HB 2471 Computer Crimes Act; changes in provisions, penalty". 喺March 08搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  91. Brulliard, Karin (April 10, 2005). "Va. Lawmakers Aim to Hook Cyberscammers". Washington Post.
  92. "Earthlink evidence helps slam the door on phisher site spam ring". 喺December 14搵到. Unknown parameter |accessyear= ignored (|access-date= suggested) (help); Check date values in: |accessdate= (help)
  93. Prince, Brian (January 18 2007). "Man Found Guilty of Targeting AOL Customers in Phishing Scam". PCMag.com. Check date values in: |date= (help)
  94. Leyden, John (January 17 2007). "AOL phishing fraudster found guilty". The Register. Check date values in: |date= (help)
  95. Leyden, John (June 13 2007). "AOL phisher nets six years' imprisonment". The Register. Check date values in: |date= (help)
  96. Gaudin, Sharon (June 12 2007). "California Man Gets 6-Year Sentence For Phishing". InformationWeek. Check date values in: |date= (help)

External links[編輯]

Template:SE

Template:Spamming