{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists

A Oest, Y Safaei, P Zhang, B Wardman… - 29th USENIX Security …, 2020 - usenix.org
Due to their ubiquity in modern web browsers, anti-phishing blacklists are a key defense
against large-scale phishing attacks. However, sophistication in phishing websites—such as …

Scam pandemic: How attackers exploit public fear through phishing

M Bitaab, H Cho, A Oest, P Zhang, Z Sun… - … on Electronic Crime …, 2020 - ieeexplore.ieee.org
As the COVID-19 pandemic started triggering widespread lockdowns across the globe,
cybercriminals did not hesitate to take advantage of users' increased usage of the Internet …

Who is targeted by email-based phishing and malware? measuring factors that differentiate risk

C Simoiu, A Zand, K Thomas, E Bursztein - Proceedings of the ACM …, 2020 - dl.acm.org
As technologies to defend against phishing and malware often impose an additional
financial and usability cost on users (such as security keys), a question remains as to who …

Are you human? resilience of phishing detection to evasion techniques based on human verification

S Maroofi, M Korczyński, A Duda - Proceedings of the ACM Internet …, 2020 - dl.acm.org
Phishing is one of the most common cyberattacks these days. Attackers constantly look for
new techniques to make their campaigns more lucrative by extending the lifespan of …

Phishing with a darknet: Imitation of onion services

F Barr-Smith, J Wright - 2020 APWG Symposium on Electronic …, 2020 - ieeexplore.ieee.org
In this work we analyse the use of malicious mimicry and cloning of darknet marketplaces
and otheronion services' as means for phishing, akin to traditionaltyposquatting'on the web …

Phishing attacks and mitigation tactics

N Särökaari - 2020 - jyx.jyu.fi
Social engineering-based attacks, such as phishing and more targeted, spear phishing
attacks remains to be one of the most common attack vectors used by threat actors. These …

[图书][B] Secure by default: a behavioral approach to cyber security

C Simoiu - 2020 - search.proquest.com
Most computer systems that interface with the internet today presume that users will adopt
additional security measures to protect themselves against phishing and malware attacks …

[PDF][PDF] Phishing landscape 2020

G Aaron, L Chapin, D Piscitello, C Strutt - 2020 - interisle.net
Phishing is a significant threat to millions of Internet users. Phishing attacks lure victims to a
web site that appears to be operated by a trusted entity, such as a bank, a merchant, or other …

Leveraging scalable data analysis to proactively bolster the anti-phishing ecosystem

A Oest - 2020 - search.proquest.com
Despite an abundance of defenses that work to protect Internet users from online threats,
malicious actors continue deploying relentless large-scale phishing attacks that target these …

[PDF][PDF] For good measure

D Geer - USENIX PATRONS, 2020 - usenix.org
For Good Measure: Security Measurement in the Present Tense interesting, as would rank
ordering cybersecurity functions by whether their operators are deemed essential …