Matches in SemOpenAlex for { <https://semopenalex.org/work/W270893990> ?p ?o ?g. }
Showing items 1 to 79 of
79
with 100 items per page.
- W270893990 startingPage "46" @default.
- W270893990 abstract "The fast-growing online fraud with the funny name--phishing--is anything but a laughing matter for bankers. Unique attacks jumped 4,000% in the last six months with a particularly disturbing spike in April, putting many in the financial services industry on guard. And, while hard to trace, there is indirect evidence that payout to criminals is getting more substantial as phishing graduates from a pesky way to get free services to yet another method of wrangling personal information. With phishing, pretext e-mails are sent to consumers by the millions. Legitimate addresses are either purchased on the cyber black market or parsed together by programs that randomly combine common last names and first initials with common domains: resulting in, say, lsmith@hotmail.com. By random probability, some will happen to correspond with legitimate addresses where the user has a bank account (or with other e-commerce sites where passwords are required), notes Jim Maloney, chief security executive with Corillian Corp., Hillsboro, Ore., which offers an antifraud solution that can monitor phishing attacks. Each contains links to unauthorized web pages, created by criminals, that ask for personal information such as Social Security numbers or passwords. (In a newer variant of attack, fraudsters place spyware in the phish mail which scans the desktop. This gives criminals, in effect, a window into a user's keystrokes). Phishers make use of pop ups and pop under pages by manipulating HTML code to appear authentic, says Michael Sippey, managing director with Quris, an e-mail consulting and technology company in Denver. Both superficially [in terms of how text and images appear] and at the code level, these web pages look more and more real. In effect, they've been copied with only minor changes, notes Ben McBeen, a network engineer with $390 million assets Plumas Bank, Quincy, Calif. With a low percentage of internet users and rural operating footprint Plumas has been spared, so far. Yet some of its employees with accounts elsewhere have been targeted, McBeen notes. One co-worker got an e-mail claiming to be from a major institution telling her that a suspicious transaction had occurred on her account, says McBeen. We did an analysis of the e-mail for her using our e-mail detection solution and showed her that, had she clicked on the link and followed through, it would have passed her information to an unauthorized third party. Looking good and hard to trace Who has been the victim of phish mail? Citibank for one. Probably because of its huge consumer base and high visibility it was the financial institution with the highest level of reported attacks, according to information collected by the Anti Phishing Working Group, a new organization that researches attacks and issues trend reports. (www.antiphishing.org) In May, APWG noted that Citibank was the victim of 370 unique attacks (that is, the bank's brand was hijacked that many times by various third parties with criminal intent.) This was down from an April high of 475 but was still a huge number, considering that in December of 2003, only 17 such attacks had occurred. Citibank, however, isn't alone. APWG has cited as victims U.S. Bank, Visa, Lloyds, Barclays, Bank One, Chase and others--23 known institutions or Fortune 500 companies in all. Attacks of some sort are occurring on a daily basis, and anecdotal evidence indicates that they may be trickling downstream as bigger banks begin to shore up defenses. Why is phishing gaining traction? For one thing, it's easy for the perpetrators to be, and stay, anonymous. Made possible by the relative ease with which e-mail messages can be spoofed or faked, phishing requires professional sleuths--the FBI, Secret Service, and tech forensics experts--to trace phony phish mails to actual fraudsters. …" @default.
- W270893990 created "2016-06-24" @default.
- W270893990 creator A5087348624 @default.
- W270893990 date "2004-09-01" @default.
- W270893990 modified "2023-09-23" @default.
- W270893990 title "Phishing Phace-Off: Online Fraudsters and Vendors Do Battle to Gain Control of Electronic Information. Meanwhile, Incidents Rise and Consumer Confidence Suffers" @default.
- W270893990 hasPublicationYear "2004" @default.
- W270893990 type Work @default.
- W270893990 sameAs 270893990 @default.
- W270893990 citedByCount "1" @default.
- W270893990 countsByYear W2708939902012 @default.
- W270893990 crossrefType "journal-article" @default.
- W270893990 hasAuthorship W270893990A5087348624 @default.
- W270893990 hasConcept C108827166 @default.
- W270893990 hasConcept C109297577 @default.
- W270893990 hasConcept C110875604 @default.
- W270893990 hasConcept C112698675 @default.
- W270893990 hasConcept C136764020 @default.
- W270893990 hasConcept C138885662 @default.
- W270893990 hasConcept C141141315 @default.
- W270893990 hasConcept C144133560 @default.
- W270893990 hasConcept C145097563 @default.
- W270893990 hasConcept C158955206 @default.
- W270893990 hasConcept C169093310 @default.
- W270893990 hasConcept C199360897 @default.
- W270893990 hasConcept C2778707766 @default.
- W270893990 hasConcept C2983355114 @default.
- W270893990 hasConcept C38652104 @default.
- W270893990 hasConcept C41008148 @default.
- W270893990 hasConcept C41895202 @default.
- W270893990 hasConcept C83860907 @default.
- W270893990 hasConceptScore W270893990C108827166 @default.
- W270893990 hasConceptScore W270893990C109297577 @default.
- W270893990 hasConceptScore W270893990C110875604 @default.
- W270893990 hasConceptScore W270893990C112698675 @default.
- W270893990 hasConceptScore W270893990C136764020 @default.
- W270893990 hasConceptScore W270893990C138885662 @default.
- W270893990 hasConceptScore W270893990C141141315 @default.
- W270893990 hasConceptScore W270893990C144133560 @default.
- W270893990 hasConceptScore W270893990C145097563 @default.
- W270893990 hasConceptScore W270893990C158955206 @default.
- W270893990 hasConceptScore W270893990C169093310 @default.
- W270893990 hasConceptScore W270893990C199360897 @default.
- W270893990 hasConceptScore W270893990C2778707766 @default.
- W270893990 hasConceptScore W270893990C2983355114 @default.
- W270893990 hasConceptScore W270893990C38652104 @default.
- W270893990 hasConceptScore W270893990C41008148 @default.
- W270893990 hasConceptScore W270893990C41895202 @default.
- W270893990 hasConceptScore W270893990C83860907 @default.
- W270893990 hasIssue "9" @default.
- W270893990 hasLocation W2708939901 @default.
- W270893990 hasOpenAccess W270893990 @default.
- W270893990 hasPrimaryLocation W2708939901 @default.
- W270893990 hasRelatedWork W102276359 @default.
- W270893990 hasRelatedWork W133717707 @default.
- W270893990 hasRelatedWork W1763839923 @default.
- W270893990 hasRelatedWork W188470225 @default.
- W270893990 hasRelatedWork W195923199 @default.
- W270893990 hasRelatedWork W2083492854 @default.
- W270893990 hasRelatedWork W2093108064 @default.
- W270893990 hasRelatedWork W2299023879 @default.
- W270893990 hasRelatedWork W236856862 @default.
- W270893990 hasRelatedWork W250327106 @default.
- W270893990 hasRelatedWork W2581701677 @default.
- W270893990 hasRelatedWork W276876715 @default.
- W270893990 hasRelatedWork W2911907709 @default.
- W270893990 hasRelatedWork W2992542458 @default.
- W270893990 hasRelatedWork W2992806770 @default.
- W270893990 hasRelatedWork W325777740 @default.
- W270893990 hasRelatedWork W340834793 @default.
- W270893990 hasRelatedWork W592534800 @default.
- W270893990 hasRelatedWork W2181782897 @default.
- W270893990 hasRelatedWork W2616076104 @default.
- W270893990 hasVolume "96" @default.
- W270893990 isParatext "false" @default.
- W270893990 isRetracted "false" @default.
- W270893990 magId "270893990" @default.
- W270893990 workType "article" @default.