Mobile devices: A phisher's paradise

作者: Nikos Virvilis , Nikolaos Tsalis , Alexios Mylonas , Dimitris Gritzalis

DOI: 10.5220/0005045000790087

关键词:

摘要: Mobile devices — especially smartphones have gained widespread adoption in recent years, due to the plethora of features they offer. The use such for web browsing and accessing email services is also getting continuously more popular. same holds true with other sensitive online activities, as shopping, contactless payments, banking. However, security mechanisms that are available on protect their users from threats not yet mature, well effectiveness still questionable. As a result, smartphone face increased risks when performing activities devices, compared desktop/laptop users. In this paper, we present an evaluation phishing protection popular browsers Android iOS. Then, compare offer against desktop counterparts, revealing analyzing significant gap between two.

参考文章(21)
Sencun Zhu, Zhi Xu, Abusing notification services on smartphones for phishing and spamming WOOT'12 Proceedings of the 6th USENIX conference on Offensive Technologies. pp. 1- 1 ,(2012)
Marianthi Theoharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis, Risk-Based Criticality Analysis international conference on critical infrastructure protection. ,vol. 311, pp. 35- 49 ,(2009) , 10.1007/978-3-642-04798-5_3
Serge Egelman, Stuart Schechter, The Importance of Being Earnest [In Security Warnings] financial cryptography. pp. 52- 59 ,(2013) , 10.1007/978-3-642-39884-1_5
Stelios Dritsas, Dimitris Gritzalis, Alexios Mylonas, Bill Tsoumas, Smartphone security evaluation The malware attack case international conference on security and cryptography. pp. 25- 36 ,(2011)
Timothy Vidas, Emmanuel Owusu, Shuai Wang, Cheng Zeng, Lorrie Faith Cranor, Nicolas Christin, QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks financial cryptography. pp. 52- 69 ,(2013) , 10.1007/978-3-642-41320-9_4
Marianthi Theoharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis, A multi-layer Criticality Assessment methodology based on interdependencies Computers & Security. ,vol. 29, pp. 643- 658 ,(2010) , 10.1016/J.COSE.2010.02.003
Nikos Virvilis, Dimitris Gritzalis, The Big Four - What We Did Wrong in Advanced Persistent Threat Detection? availability, reliability and security. pp. 248- 254 ,(2013) , 10.1109/ARES.2013.32
K. Jansson, R. von Solms, Phishing for phishing awareness Behaviour & Information Technology. ,vol. 32, pp. 584- 593 ,(2013) , 10.1080/0144929X.2011.632650
Angelo P. E. Rosiello, Engin Kirda, Christopher Kruegel, Fabrizio Ferrandi, A layout-similarity-based approach for detecting phishing pages international workshop on security. pp. 454- 463 ,(2007) , 10.1109/SECCOM.2007.4550367
Nikos Virvilis, Dimitris Gritzalis, Theodoros Apostolopoulos, Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game? ubiquitous intelligence and computing. pp. 396- 403 ,(2013) , 10.1109/UIC-ATC.2013.80