SlideShare a Scribd company logo
1 of 11
ο‚ž A Novel Phishing Page Detection Mechanism
Using HTML Source Code Comparison and
Cosine Similarity
Roopak.S, Tony Thomas
School of Computer Science & IT
Indian Institute of Information Technology and Management –
Kerala Thiruvananthapuram,India
ο‚ž Phishing is the method used to steal
personal information through spamming
or other deceptive means.
ο‚ž Phishing is a technique used by hackers
to trap online users.
ο‚ž In computing, phishing is a criminal
activity using social engineering
techniques.
ο‚ž eBay and PayPal are two most targeted
companiesw, and online banks are also
common targets.
ο‚ž Phishing is typically carried out by email
or instant messaging, and often directs
users to give details at a website.
ο‚ž 2,000,000 emails are sent
ο‚ž 5% get to the end user – 100,000 (APWG)
ο‚ž 5% click on the phishing link – 5,000 (APWG)
ο‚ž 2% enter data into the phishing site–100(Gartner)
ο‚ž $1,200 from each person who enters data (FTC)
ο‚ž Potential reward: $120,000.
ο‚ž As scam artists become more
sophisticated, so do their phishing e-mail
messages and pop-up windows.
ο‚ž They often include official-looking logos
from real organizations and other
identifying information taken directly
from legitimate Web sites.
ο‚ž The Impact of phishing are both domestical
and international, that are concern with the
commercial and financial sectors
ο‚ž Erosion of Public Trust in the Internet. Phishing
also decreases the public’s trust in the Internet
ο‚ž Direct Financial Loss.
ο‚ž Ensure that your Internet browser is up to
date and security patches applied.
ο‚ž Avoid responsing any unknown email or
giving your financial information to that mail.
ο‚ž Regularly log into your online accounts.
Don't leave them for a long period of time
ο‚ž If anything is suspicious, contact your bank
and all card issuers
ο‚ž http://en.wikipedia.org/wiki/Phishing
ο‚ž http://education.mrsec.wisc.edu/
ο‚ž http://www.phishing.org/phishing-techniques/
ο‚ž Thank you

More Related Content

What's hot

Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
Β 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentationBokangMalunga
Β 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
Β 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
Β 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by FortinetAtlantic Training, LLC.
Β 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptxMohammedYaseen638128
Β 
Phishing
PhishingPhishing
PhishingHHSome
Β 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
Β 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
Β 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle managementhaneen Emeir, CISA, ISO27001
Β 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
Β 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
Β 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security AwarenessSurya Bathulapalli
Β 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
Β 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on PhishingPankaj Yadav
Β 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
Β 

What's hot (20)

Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Β 
Phishing
PhishingPhishing
Phishing
Β 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
Β 
Phising
PhisingPhising
Phising
Β 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
Β 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Β 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
Β 
Social engineering
Social engineering Social engineering
Social engineering
Β 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
Β 
Phishing
PhishingPhishing
Phishing
Β 
Phishing attack
Phishing attackPhishing attack
Phishing attack
Β 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
Β 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
Β 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
Β 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Β 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
Β 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Β 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
Β 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
Β 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Β 

Viewers also liked

Malicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine LearningMalicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine Learningsecurityxploded
Β 
Improving circuit miniaturization and its efficiency using Rough Set Theory( ...
Improving circuit miniaturization and its efficiency using Rough Set Theory( ...Improving circuit miniaturization and its efficiency using Rough Set Theory( ...
Improving circuit miniaturization and its efficiency using Rough Set Theory( ...Sarvesh Singh
Β 
Impostor Detection presentation to ISC2 NH
Impostor Detection presentation to ISC2 NHImpostor Detection presentation to ISC2 NH
Impostor Detection presentation to ISC2 NHastraid
Β 
A survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac techniqueA survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac techniquebhas_ani
Β 
Learning to Detect Phishing Emails
Learning to Detect Phishing EmailsLearning to Detect Phishing Emails
Learning to Detect Phishing Emailsbutest
Β 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTIONumme ayesha
Β 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacksSreejith.D. Menon
Β 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security pptVenkatesh Chary
Β 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on PhishingCreative Technology
Β 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
Β 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
Β 

Viewers also liked (11)

Malicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine LearningMalicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine Learning
Β 
Improving circuit miniaturization and its efficiency using Rough Set Theory( ...
Improving circuit miniaturization and its efficiency using Rough Set Theory( ...Improving circuit miniaturization and its efficiency using Rough Set Theory( ...
Improving circuit miniaturization and its efficiency using Rough Set Theory( ...
Β 
Impostor Detection presentation to ISC2 NH
Impostor Detection presentation to ISC2 NHImpostor Detection presentation to ISC2 NH
Impostor Detection presentation to ISC2 NH
Β 
A survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac techniqueA survey on detection of website phishing using mcac technique
A survey on detection of website phishing using mcac technique
Β 
Learning to Detect Phishing Emails
Learning to Detect Phishing EmailsLearning to Detect Phishing Emails
Learning to Detect Phishing Emails
Β 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
Β 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
Β 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Β 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
Β 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Β 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
Β 

Similar to Phishing

Email phishing: Text classification using natural language processing
Email phishing: Text classification using natural language processingEmail phishing: Text classification using natural language processing
Email phishing: Text classification using natural language processingCSITiaesprime
Β 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing TechniquesIRJET Journal
Β 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Alexander Decker
Β 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
Β 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
Β 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsIRJET Journal
Β 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
Β 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
Β 
Improving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association MiningImproving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association Miningtheijes
Β 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
Β 
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...Executive Leaders Network
Β 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10seadeloitte
Β 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
Β 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdfgaherwarsaloni1234
Β 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfEvs, Lahore
Β 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyFirst Atlantic Commerce
Β 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
Β 

Similar to Phishing (20)

Email phishing: Text classification using natural language processing
Email phishing: Text classification using natural language processingEmail phishing: Text classification using natural language processing
Email phishing: Text classification using natural language processing
Β 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing Techniques
Β 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
Β 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
Β 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
Β 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
Β 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
Β 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
Β 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
Β 
Spear Phishing
Spear PhishingSpear Phishing
Spear Phishing
Β 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
Β 
Improving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association MiningImproving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association Mining
Β 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
Β 
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Β 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
Β 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
Β 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
Β 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
Β 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
Β 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Β 

Recently uploaded

Russian Call Girls in Kolkata Samaira 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🀌  8250192130 πŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🀌  8250192130 πŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🀌 8250192130 πŸš€ Vip Call Girls Kolkataanamikaraghav4
Β 
Call Girls In Sukhdev Vihar Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Sukhdev Vihar Delhi πŸ’―Call Us πŸ”8264348440πŸ”Call Girls In Sukhdev Vihar Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Sukhdev Vihar Delhi πŸ’―Call Us πŸ”8264348440πŸ”soniya singh
Β 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
Β 
Chennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts serviceChennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts servicevipmodelshub1
Β 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
Β 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
Β 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
Β 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Β 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
Β 
Enjoy Night⚑Call Girls Dlf City Phase 3 Gurgaon >ΰΌ’8448380779 Escort Service
Enjoy Night⚑Call Girls Dlf City Phase 3 Gurgaon >ΰΌ’8448380779 Escort ServiceEnjoy Night⚑Call Girls Dlf City Phase 3 Gurgaon >ΰΌ’8448380779 Escort Service
Enjoy Night⚑Call Girls Dlf City Phase 3 Gurgaon >ΰΌ’8448380779 Escort ServiceDelhi Call girls
Β 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
Β 
Chennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts serviceChennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts servicesonalikaur4
Β 
Low Rate Call Girls Kolkata Avani 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🀌  8250192130 πŸš€ Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🀌  8250192130 πŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🀌 8250192130 πŸš€ Vip Call Girls Kolkataanamikaraghav4
Β 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
Β 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
Β 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
Β 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
Β 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
Β 
VIP Kolkata Call Girl Kestopur πŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur πŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur πŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur πŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Β 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
Β 

Recently uploaded (20)

Russian Call Girls in Kolkata Samaira 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🀌  8250192130 πŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🀌  8250192130 πŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Β 
Call Girls In Sukhdev Vihar Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Sukhdev Vihar Delhi πŸ’―Call Us πŸ”8264348440πŸ”Call Girls In Sukhdev Vihar Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Call Girls In Sukhdev Vihar Delhi πŸ’―Call Us πŸ”8264348440πŸ”
Β 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
Β 
Chennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts serviceChennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Alwarpet Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Β 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Β 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Β 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
Β 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
Β 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
Β 
Enjoy Night⚑Call Girls Dlf City Phase 3 Gurgaon >ΰΌ’8448380779 Escort Service
Enjoy Night⚑Call Girls Dlf City Phase 3 Gurgaon >ΰΌ’8448380779 Escort ServiceEnjoy Night⚑Call Girls Dlf City Phase 3 Gurgaon >ΰΌ’8448380779 Escort Service
Enjoy Night⚑Call Girls Dlf City Phase 3 Gurgaon >ΰΌ’8448380779 Escort Service
Β 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
Β 
Chennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts serviceChennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone πŸ† 8250192130 πŸ‘… celebrity escorts service
Β 
Low Rate Call Girls Kolkata Avani 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🀌  8250192130 πŸš€ Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🀌  8250192130 πŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🀌 8250192130 πŸš€ Vip Call Girls Kolkata
Β 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
Β 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Β 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
Β 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Β 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
Β 
VIP Kolkata Call Girl Kestopur πŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur πŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur πŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur πŸ‘‰ 8250192130 Available With Room
Β 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Β 

Phishing

  • 1.
  • 2.
  • 3. ο‚ž A Novel Phishing Page Detection Mechanism Using HTML Source Code Comparison and Cosine Similarity Roopak.S, Tony Thomas School of Computer Science & IT Indian Institute of Information Technology and Management – Kerala Thiruvananthapuram,India
  • 4. ο‚ž Phishing is the method used to steal personal information through spamming or other deceptive means. ο‚ž Phishing is a technique used by hackers to trap online users.
  • 5. ο‚ž In computing, phishing is a criminal activity using social engineering techniques. ο‚ž eBay and PayPal are two most targeted companiesw, and online banks are also common targets. ο‚ž Phishing is typically carried out by email or instant messaging, and often directs users to give details at a website.
  • 6. ο‚ž 2,000,000 emails are sent ο‚ž 5% get to the end user – 100,000 (APWG) ο‚ž 5% click on the phishing link – 5,000 (APWG) ο‚ž 2% enter data into the phishing site–100(Gartner) ο‚ž $1,200 from each person who enters data (FTC) ο‚ž Potential reward: $120,000.
  • 7. ο‚ž As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. ο‚ž They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites.
  • 8. ο‚ž The Impact of phishing are both domestical and international, that are concern with the commercial and financial sectors ο‚ž Erosion of Public Trust in the Internet. Phishing also decreases the public’s trust in the Internet ο‚ž Direct Financial Loss.
  • 9. ο‚ž Ensure that your Internet browser is up to date and security patches applied. ο‚ž Avoid responsing any unknown email or giving your financial information to that mail. ο‚ž Regularly log into your online accounts. Don't leave them for a long period of time ο‚ž If anything is suspicious, contact your bank and all card issuers