2015
DOI: 10.4236/jis.2015.63021
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Phishing Attacks and Mitigation Techniques

Abstract: Mobile devices have taken an essential role in the portable computer world. Portability, small screen size, and lower cost of production make these devices popular replacements for desktop and laptop computers for many daily tasks, such as surfing on the Internet, playing games, and shopping online. The popularity of mobile devices such as tablets and smart phones has made them a frequent target of traditional web-based attacks, especially phishing. Mobile device-based phishing takes its share of the pie to tr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(20 citation statements)
references
References 2 publications
(1 reference statement)
0
20
0
Order By: Relevance
“…Solutions. Existing phishing countermeasures use techniques such as content filtering, visual matching, and blacklist or whitelist matching [14]. Content filtering system examines the content of webpages for suspected URLs.…”
Section: Current Phishing Detectionmentioning
confidence: 99%
“…Solutions. Existing phishing countermeasures use techniques such as content filtering, visual matching, and blacklist or whitelist matching [14]. Content filtering system examines the content of webpages for suspected URLs.…”
Section: Current Phishing Detectionmentioning
confidence: 99%
“…Phishing attacks: This is where fraudsters masquerade as staff of MMSP and call or send SMS messages to the subscribers to lure them into revealing their mobile money PIN. Resiliency against phishing attacks is enhanced by employing multifactor authentication, an anomaly-based intrusion detection system, email authentication, encryption, secure sockets layer, reports of suspicious activities, back-end analytics, user training and awareness, content-based filtering, blacklisting, and whitelisting [112][113][114]. Aleroud and Zhou [115] used machine learning, profile matching, text mining, ontology, honeypots, and client-server authentication to detect phishing attacks.…”
Section: Resultsmentioning
confidence: 99%
“…Phishing attacks Multifactor authentication, anomaly-based intrusion detection system, email authentication, encryption, secure sockets layer, reports of suspicious activities, back-end analytics, user training/awareness, content-based filtering, blacklisting, and whitelisting. [112][113][114] Using machine learning, profile matching, text mining, ontology, honeypots, and client-server authentication.…”
Section: S/no Threat Models Countermeasure Social Engineering Attackmentioning
confidence: 99%
“…This paper also differentiated among several phishing detection techniques. Hossain et al proposed a research paper [ 19 ] in which the author focused on phishing attacks and their categories. In addition to this, phishing mitigation techniques and best policies to avoid phishing attacks on android devices are also discussed in this paper.…”
Section: Background Studymentioning
confidence: 99%