Spy-phishing

Spy-phishing

Spy-phising is a term coined by Jeffrey Aboud of Trend Micro, in [http://www.us.trendmicro.com/imperia/md/content/us/pdf/threats/securitylibrary/spyphishing_102006.pdf] "Spy-Phishing: A New Breed of Blended Threats", published in October, 2006, at the Virus Bulletin 2006 conference in Montreal.Defined as "crimeware" (a kind of threat that results in fraudulent financial gains), spy-phishing capitalizes on the trend of "blended threats", it borrows techniques from both phishing and spyware. The downloaded applications sit silently on the user's system until the targeted URL is visited wherein it activates, sending information to the malicious third party.Through the use of spyware and other Trojans, spy-phishing attempts to prolong the initial phishing attacks beyond the point at which the phishing site is available.


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Phishing — In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic… …   Wikipedia

  • Spyware — is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically,… …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • Cybercrime and Countermeasures — Cyber crime, or computer crime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the …   Wikipedia

  • Clandestine HUMINT — This article is a subset article under Human Intelligence. For a complete hierarchical list of articles, see the intelligence cycle management hierarchy. Concepts here also are intimately associated with counterintelligence. This article deals… …   Wikipedia

  • Webroot Software — Infobox Company company name = Webroot Software, Inc. company company type = Private company slogan = foundation = 1997 location = Boulder, Colorado, USA employees = 300 industry = Computer Security products = Spy Sweeper Window Washer Desktop… …   Wikipedia

  • Malware — Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access… …   Wikipedia

  • Sanford Wallace — Sanford Spamford Wallace is a spammer who came to notoriety in 1997, promoting himself as the original Spam King.CareerIn the late 1990s, his company, Cyber Promotions, aka Cyberpromo, was widely blacklisted as a source of unsolicited email.… …   Wikipedia

  • Internet privacy — involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information… …   Wikipedia

  • Russian Business Network — The Russian Business Network (commonly abbreviated as RBN) is a multi faceted cybercrime organization, specializing in and in some cases monopolizing personal identity theft for resale. It is the originator of MPack (software) and an alleged… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”