Phishing: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
=Study Guide= | =Study Guide= | ||
==Background== | |||
==Phishing Attacks== | |||
===Keyloggers=== | |||
===Torpig-family Trojan=== | |||
===Session Hijackers=== | |||
===Content-Injection Phishing=== | |||
===“Universal” Man-in-the-middle phishing kit=== | |||
===Search Engine Phishing=== | |||
===Spear Phishing=== | |||
==Phishing solutions== | |||
===Phishing blacklist=== | |||
===Bookmarks or history=== | |||
===Two-Way Authentication=== | |||
===VeriSign Identity Protection (VIP)=== | |||
===Early alarm=== | |||
=Bibliography= | =Bibliography= |