FANDOM


Citation Edit

Aaron Emigh, Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures (Rev. 1.3) (Oct. 3, 2005) (full-text).

Overview Edit

This report examines the information flow in phishing attacks of all types. Technologies used by phishers are discussed, in combination with countermeasures that can be applied. The focus is primarily on technology that can be deployed to stop phishing. Both currently available countermeasures and research-stage technologies are discussed.

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.