6. Adding Context to Phishing Attacks: Spear Phishing

  1. Markus Jakobsson1 and
  2. Steven Myers2

Published Online: 18 MAY 2006

DOI: 10.1002/9780470086100.ch6

Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft

Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft

How to Cite

Jakobsson, M. and Myers, S. (eds) (2006) Adding Context to Phishing Attacks: Spear Phishing, in Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft, John Wiley & Sons, Inc., Hoboken, NJ, USA. doi: 10.1002/9780470086100.ch6

Editor Information

  1. 1

    Indiana University Bloomington, Indiana

  2. 2

    Indiana University Bloomington, Indiana

Publication History

  1. Published Online: 18 MAY 2006
  2. Published Print: 29 NOV 2006

ISBN Information

Print ISBN: 9780471782452

Online ISBN: 9780470086100

SEARCH

Keywords:

  • spear phishing;
  • automated trawling;
  • heuristics;
  • data mining;
  • browser attacks

Summary

This chapter contains sections titled:

  • Overview of Context Aware Phishing

  • Modeling Phishing Attacks

  • Case Study: Automated Trawling for Public Private Data

  • Case Study: Using Your Social Network Against You

  • Case Study: Browser Recon Attacks

  • Case Study: Using the Autofill Feature in Phishing

  • Case Study: Acoustic Keyboard Emanations

  • References