Phish Phactors: Offensive and Defensive Strategies

  title={Phish Phactors: Offensive and Defensive Strategies},
  author={Hal Berghel and James Carpinter and Ju-Yeon Jo},
  journal={Advances in Computers},
Phishing attacks attempt to fraudulently solicit sensitive information from a user by masquerading as a known trustworthy agent. They commonly use spoofed emails in association with fake websites in order to coerce a user into revealing personal financial data. Phishing is now a serious problem with criminals adopting the well-developed and well-known… CONTINUE READING