• Corpus ID: 8648482

Early Phishing

  title={Early Phishing},
  author={Koceilah Rekouche},
The history of phishing traces back in important ways to the mid-1990s when hacking software facilitated the mass targeting of people in password stealing scams on America Online (AOL). The first of these software programs was mine, called AOHell, and it was where the word phishing was coined. The software provided an automated password and credit card-stealing mechanism starting in January 1995. Though the practice of tricking users in order to steal passwords or information possibly goes back… 

Figures from this paper


  • E. Sudarshan
  • Computer Science
  • 2020
A parallel defending approach to classifying messages as harm or spams using the Graphics Processing Unit (GPU) platform, which is achieved in logarithmic time of O(n log n) is proposed and also discusses the future scope.

Phishing Attacks Survey: Types, Vectors, and Technical Approaches

The aims of this paper are to build awareness of phishing techniques, educate individuals about these attacks, and encourage the use ofphishing prevention techniques, in addition to encouraging discourse among the professional community about this topic.

Machine Learning Based Prediction versus Human-asa-Security-Sensor

Phishing is a cyber attack that aims at gathering sensitive personal information such as financial account login credentials, credit card details, social security number, etc. through human

Utilising the concept of human-as-a-security-sensor for detecting semantic social engineering attacks

This thesis defines the terminology of a semantic attack, introducing a historic time-line of attack incidents over the last 17 years to illustrate what is an existential relationship with the user-computer interface and it's ever expanding landscape, and proposes a technical framework that aims to utilise the concept of Human-as-a-Security-Sensor as a dynamic defence mechanism against semantic attacks.

American and Indian Conceptualizations of Phishing

Using Amazon's Mechanical Turk, fifty American and sixty-one Indian participants completed a survey that assessed characteristics of phishing attacks, asked participants to describe their previous

On Cyber Crimes and Cyber Security

This chapter covers the definitions, types, and intrusions of e-crimes, and has also focused on the laws against e-Crimes in different countries.

In-nimbo sandboxing

An in-nimbo sandbox for Adobe Reader was built, thwarting several examples of existing PDF-based malware and it was found that the added increment of latency, perhaps surprisingly, does not overly impair the user experience with respect to performance or usability.

A General Methodology to Optimize and Benchmark Edge Devices

A macro level methodology that iteratively benchmarks and optimizes specific workloads on edge devices and frames the validation tests with a family of network security monitoring applications an end to end scenario fully exercises and validates the developed process.