Fraudulent and malicious web sites pose a signicant threat to desktop security, integrity, and privacy. This paper examines the threat from dierent perspectives. We harvested URLs linking to web sites from dierent sources and corpora, and conducted a study to examine these URLs in-depth. For each URL, we extract its domain name, determine its frequency, IP address and geographic location, and check if the web site is accessible. Using 3 search engines (Google, Yahoo!, and Windows Live), we check if the domain name appears in the search results; and using McAfee SiteAdvisor, we determine the domain name's safety rating. Our study shows that users can encounter URLs pointing to fraudulent and malicious web sites not only in spam and phis...
The rate of cybercrime is on the rise as more people embrace technology in their different spheres o...
Malicious web sites pretendsignificant danger to desktop security and privacy.These links become ins...
This dataset contains a collection of legitimate and phishing websites, along with information on th...
Abstract. Attackers compromise web servers in order to host fraudulent content, such as malware and ...
The ability of cyber criminals to compromise networked computer systems through the spread of malwar...
Online crime (also known as cybercrime) is becoming more organized, more complex, and therefore, mor...
Phishing is social engineering attack that inflicts damages of several billion dollars each year. Ph...
Large-scale online scam campaigns pose a significant security threat to casual Internet users. Attac...
Web Spoofing draws the client to associate with the fake sites instead of the genuine ones. The fund...
Phishing URLs and malicious software pose a serious risk to both individuals and organizations. Thes...
Compromised websites are often used by attackers to deliver ma-licious content or to host phishing p...
Abstract: URL blacklists are used by the majority of modern web browsers as a means to protect users...
Third-party websites or applications are the key entities in the web eco-system that enable websites...
Internet security threats often involve the fraudulent modification of a web site, often with the ad...
The domain name service (DNS) plays an important role in the operation of the Internet, providing a ...
The rate of cybercrime is on the rise as more people embrace technology in their different spheres o...
Malicious web sites pretendsignificant danger to desktop security and privacy.These links become ins...
This dataset contains a collection of legitimate and phishing websites, along with information on th...
Abstract. Attackers compromise web servers in order to host fraudulent content, such as malware and ...
The ability of cyber criminals to compromise networked computer systems through the spread of malwar...
Online crime (also known as cybercrime) is becoming more organized, more complex, and therefore, mor...
Phishing is social engineering attack that inflicts damages of several billion dollars each year. Ph...
Large-scale online scam campaigns pose a significant security threat to casual Internet users. Attac...
Web Spoofing draws the client to associate with the fake sites instead of the genuine ones. The fund...
Phishing URLs and malicious software pose a serious risk to both individuals and organizations. Thes...
Compromised websites are often used by attackers to deliver ma-licious content or to host phishing p...
Abstract: URL blacklists are used by the majority of modern web browsers as a means to protect users...
Third-party websites or applications are the key entities in the web eco-system that enable websites...
Internet security threats often involve the fraudulent modification of a web site, often with the ad...
The domain name service (DNS) plays an important role in the operation of the Internet, providing a ...
The rate of cybercrime is on the rise as more people embrace technology in their different spheres o...
Malicious web sites pretendsignificant danger to desktop security and privacy.These links become ins...
This dataset contains a collection of legitimate and phishing websites, along with information on th...