Abstract. Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed and categorized, anal-ysis of the methods used by attackers to identify targets has remained anecdotal. In this paper, we study the use of search engines to locate po-tentially vulnerable hosts. We present empirical evidence from the logs of websites used for phishing to demonstrate attackers ’ widespread use of search terms which seek out susceptible web servers. We establish that at least 18 % of website compromises are triggered by these searches. Many websites are repeatedly compromised whenever the root cause of the vul-nerability is not addressed. W...
Compromised websites are often used by attackers to deliver ma-licious content or to host phishing p...
There are currently dozens of freely available tools to combat phishing and other web-based scams, m...
Internet dragged more than half of the world's population into the cyber world. Unfortunately, with ...
The fight against phishing has resulted in several anticipating phishing prevention techniques. Howe...
Phishing has been easy and effective way for trickery and deception on the Internet. While solutions...
Web Spoofing draws the client to associate with the fake sites instead of the genuine ones. The fund...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
Phishers often exploit users’ trust on the appearance of a site by using webpages that are visually ...
Phishing continues to grow as phishers discover new exploits and attack vectors for hosting maliciou...
Phishing is a severe threat to online users, especially since attackers improve in impersonating oth...
Phishing is a common attack on credulous people by making them disclose their unique information. It...
Fraudulent and malicious web sites pose a signicant threat to desktop security, integrity, and priva...
There are currently dozens of freely available tools to combat phishing and other web-based scams, m...
Banks and other organisations deal with fraudulent phishing websites by pressing the hosting service...
Abstract. We propose a new phishing detection heuristic based on the search results returned from po...
Compromised websites are often used by attackers to deliver ma-licious content or to host phishing p...
There are currently dozens of freely available tools to combat phishing and other web-based scams, m...
Internet dragged more than half of the world's population into the cyber world. Unfortunately, with ...
The fight against phishing has resulted in several anticipating phishing prevention techniques. Howe...
Phishing has been easy and effective way for trickery and deception on the Internet. While solutions...
Web Spoofing draws the client to associate with the fake sites instead of the genuine ones. The fund...
Phishing is a major problem on the Web. Despite the significant attention it has received over the y...
Phishers often exploit users’ trust on the appearance of a site by using webpages that are visually ...
Phishing continues to grow as phishers discover new exploits and attack vectors for hosting maliciou...
Phishing is a severe threat to online users, especially since attackers improve in impersonating oth...
Phishing is a common attack on credulous people by making them disclose their unique information. It...
Fraudulent and malicious web sites pose a signicant threat to desktop security, integrity, and priva...
There are currently dozens of freely available tools to combat phishing and other web-based scams, m...
Banks and other organisations deal with fraudulent phishing websites by pressing the hosting service...
Abstract. We propose a new phishing detection heuristic based on the search results returned from po...
Compromised websites are often used by attackers to deliver ma-licious content or to host phishing p...
There are currently dozens of freely available tools to combat phishing and other web-based scams, m...
Internet dragged more than half of the world's population into the cyber world. Unfortunately, with ...