Phishing: Difference between revisions

From Expertiza_Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
=Study Guide=
=Study Guide=
==Background==
==Phishing Attacks==
===Keyloggers===
===Torpig-family Trojan===
===Session Hijackers===
===Content-Injection Phishing===
===“Universal” Man-in-the-middle phishing kit===
===Search Engine Phishing===
===Spear Phishing===
==Phishing solutions==
===Phishing blacklist===
===Bookmarks or history===
===Two-Way Authentication===
===VeriSign Identity Protection (VIP)===
===Early alarm===
=Bibliography=
=Bibliography=

Revision as of 11:57, 30 July 2008

Study Guide

Background

Phishing Attacks

Keyloggers

Torpig-family Trojan

Session Hijackers

Content-Injection Phishing

“Universal” Man-in-the-middle phishing kit

Search Engine Phishing

Spear Phishing

Phishing solutions

Phishing blacklist

Bookmarks or history

Two-Way Authentication

VeriSign Identity Protection (VIP)

Early alarm

Bibliography