Phishing: Difference between revisions

From Expertiza_Wiki
Jump to navigation Jump to search
No edit summary
Line 4: Line 4:
==Phishing Attacks==
==Phishing Attacks==
====Keyloggers====
====Keyloggers====
These are spywares that can get installed either into a web browser or as a device driver. They record the user’s input to the computer by recording the keyboard keystrokes or mouse click. This information will be then sent to the spyware owner. These spywares can cause severe data leak.
===Torpig-family Trojan===
===Torpig-family Trojan===
===Session Hijackers===
===Session Hijackers===

Revision as of 11:59, 31 July 2008

Study Guide

Background

Phishing Attacks

Keyloggers

These are spywares that can get installed either into a web browser or as a device driver. They record the user’s input to the computer by recording the keyboard keystrokes or mouse click. This information will be then sent to the spyware owner. These spywares can cause severe data leak.

Torpig-family Trojan

Session Hijackers

Content-Injection Phishing

“Universal” Man-in-the-middle phishing kit

Search Engine Phishing

Spear Phishing

Phishing solutions

Phishing blacklist

Bookmarks or history

Two-Way Authentication

VeriSign Identity Protection (VIP)

Early alarm

Bibliography