Talk:Phishing: Difference between revisions
imported>Pat Palmer (adding {{subpages9}}) |
imported>Sandy Harris (→Article on methods: another) |
||
(9 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
{{ | {{subpages}} | ||
== Link to add? == | |||
would [http://www.mywot.com/ Web of Trust] be a link to add, or would it be considered spam? I don't want to forum, but I use both it and site advisor and have found them to be helpful in steering away from potentially harmful sites. Thanks [[User:Ched Davis|Ched Davis]] 23:31, 7 February 2009 (UTC) | |||
:Terminology issue here: I need to go look at that link, but my first association with Web of Trust is with the [[Pretty Good Privacy]]. It's reasonable to put informative links into an External Links subpage; this gets created as a blank tab when you create the basic metadata. You can try doing that here if you feel comfortable, or I can set it up. | |||
:Links can be commercial if not advertising; some of the security vendors have very informative pages. Of course, one always has to be sure links stay active. It is a good idea to discuss, in the main article, the idea of blacklisting and whitelisting, which probably also need their own, more general articles. | |||
:We do need [[social engineering]] and some related areas that make phishing possible; indeed, see [[deception]] for a broader context on that, to which social engineering might link.[[User:Howard C. Berkowitz|Howard C. Berkowitz]] 23:42, 7 February 2009 (UTC) | |||
====Nice Work==== | |||
Nice work on this article by the way. Having a quality article like this give a new user (me) a real feel for how to contribute constructively. It gives me a good guideline on how to proceed with adding content to new articles. [[User:Ched Davis|Ched Davis]] 06:53, 8 February 2009 (UTC) | |||
== Very nice progress == | |||
I like this. We probably should be sure to indicate this may well be the primary malware vector these days, and that it's intimately tied to botnets. | |||
Perhaps a list or subpage about when to suspect phishing? You do that nicely when talking about specific software/services. I'm tempted to document a few that almost fooled me. | |||
Caveat: since I do live in the <u>f</u>ishing village of [[Chatham, Massachusetts]], your spear phishing now has put unfortunate images into my mind: hook phishing, bottom dredge phishing, trawl phishing... [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 16:42, 17 February 2011 (UTC) | |||
== Article on methods == | |||
[http://privacy-pc.com/articles/advanced-phishing-tactics-beyond-user-awareness.html Tactics] [[User:Sandy Harris|Sandy Harris]] | |||
Shamir on new threats & a [https://threatpost.com/en_us/blogs/rsa-conference-2013-experts-say-its-time-prepare-post-crypto-world-022613 post-crypto world] [[User:Sandy Harris|Sandy Harris]] 05:58, 27 February 2013 (UTC) | |||
[http://www.schneier.com/blog/archives/2013/03/phishing_has_go.html sophisticated methods] [[User:Sandy Harris|Sandy Harris]] 13:31, 1 March 2013 (UTC) |
Latest revision as of 07:31, 1 March 2013
Link to add?
would Web of Trust be a link to add, or would it be considered spam? I don't want to forum, but I use both it and site advisor and have found them to be helpful in steering away from potentially harmful sites. Thanks Ched Davis 23:31, 7 February 2009 (UTC)
- Terminology issue here: I need to go look at that link, but my first association with Web of Trust is with the Pretty Good Privacy. It's reasonable to put informative links into an External Links subpage; this gets created as a blank tab when you create the basic metadata. You can try doing that here if you feel comfortable, or I can set it up.
- Links can be commercial if not advertising; some of the security vendors have very informative pages. Of course, one always has to be sure links stay active. It is a good idea to discuss, in the main article, the idea of blacklisting and whitelisting, which probably also need their own, more general articles.
- We do need social engineering and some related areas that make phishing possible; indeed, see deception for a broader context on that, to which social engineering might link.Howard C. Berkowitz 23:42, 7 February 2009 (UTC)
Nice Work
Nice work on this article by the way. Having a quality article like this give a new user (me) a real feel for how to contribute constructively. It gives me a good guideline on how to proceed with adding content to new articles. Ched Davis 06:53, 8 February 2009 (UTC)
Very nice progress
I like this. We probably should be sure to indicate this may well be the primary malware vector these days, and that it's intimately tied to botnets.
Perhaps a list or subpage about when to suspect phishing? You do that nicely when talking about specific software/services. I'm tempted to document a few that almost fooled me.
Caveat: since I do live in the fishing village of Chatham, Massachusetts, your spear phishing now has put unfortunate images into my mind: hook phishing, bottom dredge phishing, trawl phishing... Howard C. Berkowitz 16:42, 17 February 2011 (UTC)
Article on methods
Shamir on new threats & a post-crypto world Sandy Harris 05:58, 27 February 2013 (UTC)
sophisticated methods Sandy Harris 13:31, 1 March 2013 (UTC)
- Article with Definition
- Developed Articles
- Advanced Articles
- Nonstub Articles
- Internal Articles
- Computers Developed Articles
- Computers Advanced Articles
- Computers Nonstub Articles
- Computers Internal Articles
- Law Developed Articles
- Law Advanced Articles
- Law Nonstub Articles
- Law Internal Articles
- Computers Underlinked Articles
- Underlinked Articles
- Law Underlinked Articles
- Security tag