期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Mobile Phishing Attacks and Mitigation Techniques
1
作者 Hossain Shahriar tulin klintic Victor Clincy 《Journal of Information Security》 2015年第3期206-212,共7页
Mobile devices have taken an essential role in the portable computer world. Portability, small screen size, and lower cost of production make these devices popular replacements for desktop and laptop computers for man... Mobile devices have taken an essential role in the portable computer world. Portability, small screen size, and lower cost of production make these devices popular replacements for desktop and laptop computers for many daily tasks, such as surfing on the Internet, playing games, and shopping online. The popularity of mobile devices such as tablets and smart phones has made them a frequent target of traditional web-based attacks, especially phishing. Mobile device-based phishing takes its share of the pie to trick users into entering their credentials in fake websites or fake mobile applications. This paper discusses various phishing attacks using mobile devices followed by some discussion on countermeasures. The discussion is intended to bring more awareness to emerging mobile device-based phishing attacks. 展开更多
关键词 MOBILE APPLICATION PHISHING Smishing Vishing
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部