{"title":"网络钓鱼感知与预测","authors":"Ashwitha Noble P, Hubert Veyannie V, S. H","doi":"10.1109/ICITIIT57246.2023.10068585","DOIUrl":null,"url":null,"abstract":"A practice known as URL phishing involves cybercriminals creating fake websites in order to lure victims and steal sensitive information. The attacker disguises themselves in an email, instant message, or text message, pose as a reliable source to persuade the recipient to open it. Once the recipient clicks the link, they realize they were deceived into clicking a potentially dangerous link. In this case, ransomware can be set up on the recipient's PC using a malware that can be used to lock it down or even worse the private data can be released. In spite of the fact that fraudulent websites often resemble the real thing, checking for warning signals alone is not enough to prevent URL phishing. A study found that around 90% of the data breach is due to phishing. The variety of phishing schemes has expanded over the years and they may now be more dangerous than ever before.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Phishing Perception and Prediction\",\"authors\":\"Ashwitha Noble P, Hubert Veyannie V, S. H\",\"doi\":\"10.1109/ICITIIT57246.2023.10068585\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A practice known as URL phishing involves cybercriminals creating fake websites in order to lure victims and steal sensitive information. The attacker disguises themselves in an email, instant message, or text message, pose as a reliable source to persuade the recipient to open it. Once the recipient clicks the link, they realize they were deceived into clicking a potentially dangerous link. In this case, ransomware can be set up on the recipient's PC using a malware that can be used to lock it down or even worse the private data can be released. In spite of the fact that fraudulent websites often resemble the real thing, checking for warning signals alone is not enough to prevent URL phishing. A study found that around 90% of the data breach is due to phishing. The variety of phishing schemes has expanded over the years and they may now be more dangerous than ever before.\",\"PeriodicalId\":170485,\"journal\":{\"name\":\"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITIIT57246.2023.10068585\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITIIT57246.2023.10068585","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A practice known as URL phishing involves cybercriminals creating fake websites in order to lure victims and steal sensitive information. The attacker disguises themselves in an email, instant message, or text message, pose as a reliable source to persuade the recipient to open it. Once the recipient clicks the link, they realize they were deceived into clicking a potentially dangerous link. In this case, ransomware can be set up on the recipient's PC using a malware that can be used to lock it down or even worse the private data can be released. In spite of the fact that fraudulent websites often resemble the real thing, checking for warning signals alone is not enough to prevent URL phishing. A study found that around 90% of the data breach is due to phishing. The variety of phishing schemes has expanded over the years and they may now be more dangerous than ever before.