Chapter 6. Solutions in this chapter
- Introducing Mobile Phishing Attacks
- Breaking Phishing Filters via Pharming
- Applying Machine Learning for Phishing Detection
- Detecting Mobile Phishing Using a Distributed Framework
- Identifying Vishing Attacks in the Wild
- Understanding Vishers' Tools and Techniques
- Mitigating Vishing Attacks
- Summary
- Solutions Fast Track
- Frequently Asked Questions
Introduction to Phishing and Vishing
Phishing is regarded as the 21st-century's identity theft. Hinging on social engineer and, sometimes, technical subterfuge, the attack lures victims into divulging their confidential credentials, such as credit card information, Social Security numbers, or online login credentials. The bad actor forges e-mails falsely mimicking ...
Get Mobile Malware Attacks and Defense now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.