Fandom

The IT Law Wiki

Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures

32,198pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Citation Edit

Aaron Emigh, Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures (Rev. 1.3) (Oct. 3, 2005) (full-text).

Overview Edit

This report examines the information flow in phishing attacks of all types. Technologies used by phishers are discussed, in combination with countermeasures that can be applied. The focus is primarily on technology that can be deployed to stop phishing. Both currently available countermeasures and research-stage technologies are discussed.

Also on Fandom

Random Wiki