Phish Phactors: Offensive and Defensive Strategies

@article{Berghel2007PhishPO,
  title={Phish Phactors: Offensive and Defensive Strategies},
  author={Hal Berghel and James Carpinter and Ju-Yeon Jo},
  journal={Advances in Computers},
  year={2007},
  volume={70},
  pages={223-268}
}
Phishing attacks attempt to fraudulently solicit sensitive information from a user by masquerading as a known trustworthy agent. They commonly use spoofed emails in association with fake websites in order to coerce a user into revealing personal financial data. Phishing is now a serious problem with criminals adopting the well-developed and well-known… CONTINUE READING