Exploring Historical & Emerging Phishing Techniques

Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

Aim Overflow 1.5 [Read Me]

Aim Overflow 1.5 this is for educational purposes only. under no circumstances am i responcible for any mishap u may get into due to use of this program. u are responcible for your own actions. enjoy   updated features: bot login stats three more floods logs in 50 bots rather than 30 keep track of who uve flooded -jimbo

AIM Census [Read Me]

hi i know this program is very very simple and well rather lame...but from what i found which was nothing..besides on maybe some crackers...there are no chat room aim sn collectors...so here is one for now....if all goes over well with it i will update it to final and make it better..i am thinking of making it for yahoo/aol/aim as well.....ne ideas send them to…

DecapiCcomz [Read Me]

Thanks for choosing Decapi Ccoms. I have picked you to become a beta tester. A beta tester is someone that tests a program,and sees if there is any bugs, mishaps, problems, missing files, and stuff like telling what could be better,and what could be changed. In this zip file i have included all the files that this program needs, if a window poppes up saying…