Wikipedia:WikiProject Spam/LinkReports/phishprotection.com

Source: Wikipedia, the free encyclopedia.



Users

Additions

  1. 2019-05-13 06:18:30 (UTC): User Vishgo t • c • dc • l • ef • b • bl; (2) to Phishing (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishprotection.com/wp-content/uploads/2019/02/PhishProtection_Best_Practices_For_Protecting_Your_Small_Or_Medium_Size_Business.pdf (R/Xmeta/L- removed)
    Other links: www.phishprotection.com/wp-content/uploads/2019/02/PhishProtection_Best_Practices_For_Protecting_Your_Small_Or_Medium_Size_Business.pdf (2, 13, 1, 1- R/X/L)
  2. 2019-05-20 05:02:25 (UTC): User 157.47.141.157 t • c • dc • l • ef • b • bl; (1) to Kevin Mitnick (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishprotection.com/heroes/kevin-mitnick/ (R/Xmeta/L- removed)
    Other links: www.phishprotection.com/heroes/kevin-mitnick/ (1, 13, 1, 1- R/X/L)
  3. 2019-09-13 17:32:50 (UTC): User 172.90.38.165 t • c • dc • l • ef • b • bl; (5) to Phishing (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishprotection.com/products/malware-and-ransomware-protection/ (R/Xmeta/L- removed)
    Other links: safebrowsing.google.com/safebrowsing/report_phish/?hl=en (5, -1, X, X- R/X/L) www.securityweek.com/israeli-defense-computer-hit-cyber-attack-data-expert (5, 655, 1, 0- R/X/L) www.phishing.org/history-of-phishing (5, 22, 1, 1- R/X/L) www.powershow.com/viewfl/1f004e-ZDc1Z/The_use_of_Optical_Character_Recognition_OCR_software_in_spam_filtering_powerpoint_ppt_presentation (5, 139, 1, 1- R/X/L) www.phishprotection.com/products/malware-and-ransomware-protection/ (5, 13, 1, 1- R/X/L)
  4. 2019-10-01 18:56:24 (UTC): User 74.91.119.76 t • c • dc • l • ef • b • bl; (2) to Rock Phish (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishprotection.com/resources/phishing-prevention-best-practices/ (R/Xmeta/L- removed)
    Other links: www.phishprotection.com/resources/phishing-prevention-best-practices/ (2, 13, 1, 1- R/X/L) books.google.com/books?id=BZLLBQAAQBAJ&pg=PA264&dq=Rock+Phish+gang&hl=en&sa=X&ved=0ahUKEwifm6mX3vvkAhWOA3IKHfI1C1AQ6AEILTAB#v=onepage&q=Rock%20Phish%20gang&f=false (2, -1, X, X- R/X/L)
  5. 2020-03-02 10:24:57 (UTC): w:mr:User:Sam patil7 (t - c; 44) to w:mr:फिशिंग (diff  !top) - Link: www.phishprotection.com/products/malware-and-ransomware-protection/ (R/Xmeta/L- removed)
    Other links: www.powershow.com/viewfl/1f004e-ZDc1Z/The_use_of_Optical_Character_Recognition_OCR_software_in_spam_filtering_powerpoint_ppt_presentation (44, 139, X, X- R/X/L) www.powershow.com/viewfl/1f004e-ZDc1Z/The_use_of_Optical_Character_Recognition_OCR_software_in_spam_filtering_powerpoint_ppt_presentation (44, 139, X, X- R/X/L) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (44, , X, X- R/X/L) www.webcitation.org/5w9YzPsN0?url=http://news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (44, , X, X- R/X/L) www.webcitation.org/5w9YzPsN0?url=http://news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (44, , X, X- R/X/L) q.queso.com/archives/001617 (44, , X, X- R/X/L) q.queso.com/archives/001617 (44, , X, X- R/X/L) dx.doi.org/10.1145%2F503124.503156 (44, , X, X- R/X/L) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (44, , X, X- R/X/L) www.shmoo.com/idn/homograph.txt (44, , X, X- R/X/L) web.archive.org/web/20050823111335/http://www.shmoo.com/idn/homograph.txt (44, , X, X- R/X/L) web.archive.org/web/20050823111335/http://www.shmoo.com/idn/homograph.txt (44, , X, X- R/X/L) www.phishprotection.com/products/malware-and-ransomware-protection/ (44, 13, X, X- R/X/L) www.phishprotection.com/products/malware-and-ransomware-protection/ (44, 13, X, X- R/X/L) news.softpedia.com/news/hidden-javascript-redirect-makes-phishing-pages-harder-to-detect-505295.shtml (44, , X, X- R/X/L) news.softpedia.com/news/hidden-javascript-redirect-makes-phishing-pages-harder-to-detect-505295.shtml (44, , X, X- R/X/L) www.bustspammers.com/phishing_links.html (44, , X, X- R/X/L) www.webcitation.org/6mfqUkatY?url=http://www.bustspammers.com/phishing_links.html (44, , X, X- R/X/L) www.webcitation.org/6mfqUkatY?url=http://www.bustspammers.com/phishing_links.html (44, , X, X- R/X/L) www.cert.govt.nz/individuals/alerts/invoice-scams-affecting-new-zealand-businesses/ (44, , X, X- R/X/L) www.cert.govt.nz/individuals/alerts/invoice-scams-affecting-new-zealand-businesses/ (44, , X, X- R/X/L) netforbeginners.about.com/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (44, , X, X- R/X/L) web.archive.org/web/20111018140959/http://netforbeginners.about.com/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (44, , X, X- R/X/L) web.archive.org/web/20111018140959/http://netforbeginners.about.com/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (44, , X, X- R/X/L) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (44, , X, X- R/X/L) www.webcitation.org/5w9YcgvUb?url=http://www.theregister.co.uk/2008/04/16/whaling_expedition_continues/ (44, , X, X- R/X/L) www.webcitation.org/5w9YcgvUb?url=http://www.theregister.co.uk/2008/04/16/whaling_expedition_continues/ (44, , X, X- R/X/L) www.secureworks.com/research/threat-group-4127-targets-google-accounts (44, , X, X- R/X/L) www.secureworks.com/research/threat-group-4127-targets-google-accounts (44, , X, X- R/X/L) www.firmex.com/blog/spear-phishing-whos-getting-caught/ (44, , X, X- R/X/L) www.firmex.com/blog/spear-phishing-whos-getting-caught/ (44, , X, X- R/X/L) docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/phishing#spear-phishing (44, , X, X- R/X/L) docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/phishing#spear-phishing (44, , X, X- R/X/L) www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf (44, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (44, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (44, , X, X- R/X/L) www.7xter.com/2016/08/phishing.html (44, , X, X- R/X/L) www.7xter.com/2016/08/phishing.html (44, , X, X- R/X/L) www.sans.org/security-awareness-training/resources/stop-phish (44, , X, X- R/X/L) www.sans.org/security-awareness-training/resources/stop-phish (44, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html (44, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html (44, , X, X- R/X/L) books.google.com/books?id=I-9P1EkTkigC&pg=PA433 (44, -1, X, X- R/X/L) www.yourbank.example.com (44, , X, X- R/X/L)
  6. 2020-03-02 10:32:12 (UTC): w:gu:User:Icepac111 (t - c; 198) to w:gu:फिशिंग (diff - DELETED) - Link: www.phishprotection.com/products/malware-and-ransomware-protection/ (R/Xmeta/L)
    Other links: apwg.org/reports/apwg_report_Q3_2009.pdf (198, , X, X- R/X/L) rapidshare.de/en/phishing.html (198, , X, X- R/X/L) web.archive.org/web/20080430101024/http://rapidshare.de/en/phishing.html (198, , X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (198, , X, X- R/X/L) www.webcitation.org/5gY2R1j1g?url=http://www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (198, , X, X- R/X/L) research.microsoft.com/~cormac/Papers/PhishingAsTragedy.pdf (198, , X, X- R/X/L) www.gartner.com/it/page.jsp?id=565125 (198, , X, X- R/X/L) www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (198, , X, X- R/X/L) web.archive.org/web/20061205104430/http://www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (198, , X, X- R/X/L) www.pcworld.com/resource/article/0,aid,125956,pg,1,RSS,RSS,00.asp (198, , X, X- R/X/L) web.archive.org/web/20060616110238/http://www.pcworld.com/resource/article/0%2Caid%2C125956%2Cpg%2C1%2CRSS%2CRSS%2C00.asp (198, , X, X- R/X/L) www.browser-recon.info (198, , X, X- R/X/L) web.archive.org/web/20090731125909/http://www.browser-recon.info/ (198, , X, X- R/X/L) www.irs.gov/newsroom/article/0,,id=155682,00.html (198, , X, X- R/X/L) www.webcitation.org/5w9YXj9AJ?url=http://www.irs.gov/newsroom/article/0,,id=155682,00.html (198, , X, X- R/X/L) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (198, , X, X- R/X/L) web.archive.org/web/20081028225500/http://www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (198, , X, X- R/X/L) applications.boi.com/updates/Article?PR_ID=1430 (198, , X, X- R/X/L) web.archive.org/web/20081007194413/http://applications.boi.com/updates/Article?PR_ID=1430 (198, , X, X- R/X/L) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (198, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (198, , X, X- R/X/L) www.theregister.co.uk/2005/05/03/aol_phishing/ (198, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=15013 (198, , X, X- R/X/L) firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1272/1192 (198, , X, X- R/X/L) web.archive.org/web/20111121113128/http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1272/1192 (198, , X, X- R/X/L) itmanagement.earthweb.com/secu/article.php/3451501 (198, , X, X- R/X/L) www.webcitation.org/5w9YVyMYn?url=http://itmanagement.earthweb.com/secu/article.php/3451501 (198, , X, X- R/X/L) www.csoonline.com/talkback/071905.html (198, , X, X- R/X/L) web.archive.org/web/20080324080028/http://www.csoonline.com/talkback/071905.html (198, , X, X- R/X/L) financialcryptography.com/mt/archives/000609.html (198, , X, X- R/X/L) www.rajuabju.com/warezirc/historyofaolwarez.htm (198, , X, X- R/X/L) www.webcitation.org/5w9YV2fuL?url=http://www.rajuabju.com/warezirc/historyofaolwarez.htm (198, , X, X- R/X/L) www.wordspy.com/words/phishing.asp (198, , X, X- R/X/L) www.phishing.org/history-of-phishing (198, 22, X, X- R/X/L) wired-vig.wired.com/news/technology/0,1282,9932,00.html (198, , X, X- R/X/L) web.archive.org/web/20051214053144/http://wired-vig.wired.com/news/technology/0%2C1282%2C9932%2C00.html (198, , X, X- R/X/L) simson.net/clips/1995/95.SJMN.AOL_Hackers.html (198, , X, X- R/X/L) www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?page=all (198, , X, X- R/X/L) www.met.police.uk/fraudalert/docs/internet_bank_fraud.pdf (198, , X, X- R/X/L) www.webcitation.org/5ndG8erWg?url=http://www.met.police.uk/fraudalert/docs/internet_bank_fraud.pdf (198, , X, X- R/X/L) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (198, , X, X- R/X/L) web.archive.org/web/20050324073507/http://www.silicon.com/research/specialreports/voip/0%2C3800004463%2C39128854%2C00.htm (198, , X, X- R/X/L) www.techweb.com/wire/security/186701001 (198, , X, X- R/X/L) web.archive.org/web/20070328150301/http://www.techweb.com/wire/security/186701001 (198, , X, X- R/X/L) www.chicagotribune.com/bluesky/originals/ct-gmail-phishing-attack-uiuc-bsi-20170119-story.html (198, , X, X- R/X/L) www.symantec.com/connect/blogs/covert-redirect-flaw-oauth-not-next-heartbleed (198, , X, X- R/X/L) www.scmagazine.com/covert-redirect-vulnerability-impacts-oauth-20-openid/article/345407/ (198, , X, X- R/X/L) news.yahoo.com/facebook-google-users-threatened-security-192547549.html (198, , X, X- R/X/L) thehackernews.com/2014/05/nasty-covert-redirect-vulnerability.html (198, , X, X- R/X/L) tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html (198, , X, X- R/X/L) www.foxnews.com/tech/2014/05/05/facebook-google-users-threatened-by-new-security-flaw/ (198, , X, X- R/X/L) www.tomsguide.com/us/facebook-google-covert-redirect-flaw,news-18726.html (198, , X, X- R/X/L) tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html (198, , X, X- R/X/L) tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html (198, , X, X- R/X/L) www.cnet.com/news/serious-security-flaw-in-oauth-and-openid-discovered/ (198, , X, X- R/X/L) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (198, , X, X- R/X/L) www.webcitation.org/5w9Z7NfVB?url=http://news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (198, , X, X- R/X/L) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (198, , X, X- R/X/L) www.webcitation.org/5w9Z5zOVh?url=http://news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (198, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (198, , X, X- R/X/L) www.webcitation.org/5w9Z4mv7k?url=http://blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (198, , X, X- R/X/L) news.bbc.co.uk/1/hi/technology/3608943.stm (198, , X, X- R/X/L) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (198, , X, X- R/X/L) www.webcitation.org/5w9Z2iACi?url=http://www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (198, , X, X- R/X/L) www.powershow.com/viewfl/1f004e-ZDc1Z/The_use_of_Optical_Character_Recognition_OCR_software_in_spam_filtering_powerpoint_ppt_presentation (198, 139, X, X- R/X/L) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (198, , X, X- R/X/L) www.webcitation.org/5w9YzPsN0?url=http://news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (198, , X, X- R/X/L) www.thoughtcrime.org/software/sslstrip/. (198, , X, X- R/X/L) www.theregister.co.uk/2007/12/12/phishing_redirection/ (198, , X, X- R/X/L) q.queso.com/archives/001617 (198, , X, X- R/X/L) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (198, , X, X- R/X/L) doi.org/10.1145/503124.503156 (198, , X, X- R/X/L) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (198, , X, X- R/X/L) www.shmoo.com/idn/homograph.txt (198, , X, X- R/X/L) web.archive.org/web/20050823111335/http://www.shmoo.com/idn/homograph.txt (198, , X, X- R/X/L) www.phishprotection.com/products/malware-and-ransomware-protection/ (198, 13, X, X- R/X/L) news.softpedia.com/news/hidden-javascript-redirect-makes-phishing-pages-harder-to-detect-505295.shtml (198, , X, X- R/X/L) www.bustspammers.com/phishing_links.html (198, , X, X- R/X/L) www.webcitation.org/6mfqUkatY?url=http://www.bustspammers.com/phishing_links.html (198, , X, X- R/X/L) www.nzherald.co.nz/personal-finance/news/article.cfm?c_id=12&objectid=12104611 (198, , X, X- R/X/L) www.cert.govt.nz/individuals/alerts/invoice-scams-affecting-new-zealand-businesses/ (198, , X, X- R/X/L) netforbeginners.about.com/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (198, , X, X- R/X/L) web.archive.org/web/20111018140959/http://netforbeginners.about.com/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (198, , X, X- R/X/L) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (198, , X, X- R/X/L) www.webcitation.org/5w9YcgvUb?url=http://www.theregister.co.uk/2008/04/16/whaling_expedition_continues/ (198, , X, X- R/X/L) www.washingtonpost.com/world/national-security/how-the-russians-hacked-the-dnc-and-passed-its-emails-to-wikileaks/2018/07/13/af19a828-86c3-11e8-8553-a3ce89036c78_story.html?noredirect=on (198, , X, X- R/X/L) www.secureworks.com/research/threat-group-4127-targets-google-accounts (198, , X, X- R/X/L) www.itnews.com.au/news/epsilon-breach-used-four-month-old-attack-253712 (198, , X, X- R/X/L) www.theregister.co.uk/2011/04/04/rsa_hack_howdunnit/ (198, , X, X- R/X/L) www.infosecurity-magazine.com/news/nsagchq-hacking-gets-personal-belgian/ (198, , X, X- R/X/L) www.firmex.com/blog/spear-phishing-whos-getting-caught/ (198, , X, X- R/X/L) docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/phishing#spear-phishing (198, , X, X- R/X/L) www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf (198, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (198, , X, X- R/X/L) www.7xter.com/2016/08/phishing.html (198, , X, X- R/X/L) www.sans.org/security-awareness-training/resources/stop-phish (198, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html (198, , X, X- R/X/L) books.google.com/books?id=I-9P1EkTkigC&pg=PA433 (198, -1, X, X- R/X/L) www.yourbank.example.com/, (198, , X, X- R/X/L)
  7. 2020-03-02 10:38:06 (UTC): w:gu:User:Icepac111 (t - c; 198) to w:gu:ફિશિંગ (diff  !top) - Link: www.phishprotection.com/products/malware-and-ransomware-protection/ (R/Xmeta/L- removed)
    Other links: web.archive.org/web/20090731125909/http://www.browser-recon.info/ (198, , X, X- R/X/L) www.irs.gov/newsroom/article/0,,id=155682,00.html (198, , X, X- R/X/L) www.webcitation.org/5w9YXj9AJ?url=http://www.irs.gov/newsroom/article/0,,id=155682,00.html (198, , X, X- R/X/L) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (198, , X, X- R/X/L) web.archive.org/web/20081028225500/http://www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (198, , X, X- R/X/L) applications.boi.com/updates/Article?PR_ID=1430 (198, , X, X- R/X/L) web.archive.org/web/20081007194413/http://applications.boi.com/updates/Article?PR_ID=1430 (198, , X, X- R/X/L) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (198, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (198, , X, X- R/X/L) www.theregister.co.uk/2005/05/03/aol_phishing/ (198, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=15013 (198, , X, X- R/X/L) firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1272/1192 (198, , X, X- R/X/L) web.archive.org/web/20111121113128/http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1272/1192 (198, , X, X- R/X/L) itmanagement.earthweb.com/secu/article.php/3451501 (198, , X, X- R/X/L) www.webcitation.org/5w9YVyMYn?url=http://itmanagement.earthweb.com/secu/article.php/3451501 (198, , X, X- R/X/L) www.csoonline.com/talkback/071905.html (198, , X, X- R/X/L) web.archive.org/web/20080324080028/http://www.csoonline.com/talkback/071905.html (198, , X, X- R/X/L) financialcryptography.com/mt/archives/000609.html (198, , X, X- R/X/L) www.rajuabju.com/warezirc/historyofaolwarez.htm (198, , X, X- R/X/L) www.webcitation.org/5w9YV2fuL?url=http://www.rajuabju.com/warezirc/historyofaolwarez.htm (198, , X, X- R/X/L) www.wordspy.com/words/phishing.asp (198, , X, X- R/X/L) www.phishing.org/history-of-phishing (198, 22, X, X- R/X/L) wired-vig.wired.com/news/technology/0,1282,9932,00.html (198, , X, X- R/X/L) web.archive.org/web/20051214053144/http://wired-vig.wired.com/news/technology/0%2C1282%2C9932%2C00.html (198, , X, X- R/X/L) simson.net/clips/1995/95.SJMN.AOL_Hackers.html (198, , X, X- R/X/L) www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?page=all (198, , X, X- R/X/L) www.met.police.uk/fraudalert/docs/internet_bank_fraud.pdf (198, , X, X- R/X/L) www.webcitation.org/5ndG8erWg?url=http://www.met.police.uk/fraudalert/docs/internet_bank_fraud.pdf (198, , X, X- R/X/L) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (198, , X, X- R/X/L) web.archive.org/web/20050324073507/http://www.silicon.com/research/specialreports/voip/0%2C3800004463%2C39128854%2C00.htm (198, , X, X- R/X/L) www.techweb.com/wire/security/186701001 (198, , X, X- R/X/L) web.archive.org/web/20070328150301/http://www.techweb.com/wire/security/186701001 (198, , X, X- R/X/L) www.chicagotribune.com/bluesky/originals/ct-gmail-phishing-attack-uiuc-bsi-20170119-story.html (198, , X, X- R/X/L) www.symantec.com/connect/blogs/covert-redirect-flaw-oauth-not-next-heartbleed (198, , X, X- R/X/L) www.scmagazine.com/covert-redirect-vulnerability-impacts-oauth-20-openid/article/345407/ (198, , X, X- R/X/L) news.yahoo.com/facebook-google-users-threatened-security-192547549.html (198, , X, X- R/X/L) thehackernews.com/2014/05/nasty-covert-redirect-vulnerability.html (198, , X, X- R/X/L) tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html (198, , X, X- R/X/L) www.foxnews.com/tech/2014/05/05/facebook-google-users-threatened-by-new-security-flaw/ (198, , X, X- R/X/L) www.tomsguide.com/us/facebook-google-covert-redirect-flaw,news-18726.html (198, , X, X- R/X/L) tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html (198, , X, X- R/X/L) tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html (198, , X, X- R/X/L) www.cnet.com/news/serious-security-flaw-in-oauth-and-openid-discovered/ (198, , X, X- R/X/L) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (198, , X, X- R/X/L) www.webcitation.org/5w9Z7NfVB?url=http://news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (198, , X, X- R/X/L) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (198, , X, X- R/X/L) www.webcitation.org/5w9Z5zOVh?url=http://news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (198, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (198, , X, X- R/X/L) www.webcitation.org/5w9Z4mv7k?url=http://blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (198, , X, X- R/X/L) news.bbc.co.uk/1/hi/technology/3608943.stm (198, , X, X- R/X/L) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (198, , X, X- R/X/L) www.webcitation.org/5w9Z2iACi?url=http://www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (198, , X, X- R/X/L) www.powershow.com/viewfl/1f004e-ZDc1Z/The_use_of_Optical_Character_Recognition_OCR_software_in_spam_filtering_powerpoint_ppt_presentation (198, 139, X, X- R/X/L) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (198, , X, X- R/X/L) www.webcitation.org/5w9YzPsN0?url=http://news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (198, , X, X- R/X/L) www.thoughtcrime.org/software/sslstrip/. (198, , X, X- R/X/L) www.theregister.co.uk/2007/12/12/phishing_redirection/ (198, , X, X- R/X/L) q.queso.com/archives/001617 (198, , X, X- R/X/L) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (198, , X, X- R/X/L) doi.org/10.1145/503124.503156 (198, , X, X- R/X/L) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (198, , X, X- R/X/L) www.shmoo.com/idn/homograph.txt (198, , X, X- R/X/L) web.archive.org/web/20050823111335/http://www.shmoo.com/idn/homograph.txt (198, , X, X- R/X/L) www.phishprotection.com/products/malware-and-ransomware-protection/ (198, 13, X, X- R/X/L) news.softpedia.com/news/hidden-javascript-redirect-makes-phishing-pages-harder-to-detect-505295.shtml (198, , X, X- R/X/L) www.bustspammers.com/phishing_links.html (198, , X, X- R/X/L) www.webcitation.org/6mfqUkatY?url=http://www.bustspammers.com/phishing_links.html (198, , X, X- R/X/L) www.nzherald.co.nz/personal-finance/news/article.cfm?c_id=12&objectid=12104611 (198, , X, X- R/X/L) www.cert.govt.nz/individuals/alerts/invoice-scams-affecting-new-zealand-businesses/ (198, , X, X- R/X/L) netforbeginners.about.com/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (198, , X, X- R/X/L) web.archive.org/web/20111018140959/http://netforbeginners.about.com/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (198, , X, X- R/X/L) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (198, , X, X- R/X/L) www.webcitation.org/5w9YcgvUb?url=http://www.theregister.co.uk/2008/04/16/whaling_expedition_continues/ (198, , X, X- R/X/L) www.washingtonpost.com/world/national-security/how-the-russians-hacked-the-dnc-and-passed-its-emails-to-wikileaks/2018/07/13/af19a828-86c3-11e8-8553-a3ce89036c78_story.html?noredirect=on (198, , X, X- R/X/L) www.secureworks.com/research/threat-group-4127-targets-google-accounts (198, , X, X- R/X/L) www.itnews.com.au/news/epsilon-breach-used-four-month-old-attack-253712 (198, , X, X- R/X/L) www.theregister.co.uk/2011/04/04/rsa_hack_howdunnit/ (198, , X, X- R/X/L) www.infosecurity-magazine.com/news/nsagchq-hacking-gets-personal-belgian/ (198, , X, X- R/X/L) www.firmex.com/blog/spear-phishing-whos-getting-caught/ (198, , X, X- R/X/L) docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/phishing#spear-phishing (198, , X, X- R/X/L) www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf (198, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (198, , X, X- R/X/L) www.7xter.com/2016/08/phishing.html (198, , X, X- R/X/L) www.sans.org/security-awareness-training/resources/stop-phish (198, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html (198, , X, X- R/X/L) books.google.com/books?id=I-9P1EkTkigC&pg=PA433 (198, -1, X, X- R/X/L) www.yourbank.example.com/, (198, , X, X- R/X/L) apwg.org/reports/apwg_report_Q3_2009.pdf (198, , X, X- R/X/L) rapidshare.de/en/phishing.html (198, , X, X- R/X/L) web.archive.org/web/20080430101024/http://rapidshare.de/en/phishing.html (198, , X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (198, , X, X- R/X/L) www.webcitation.org/5gY2R1j1g?url=http://www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (198, , X, X- R/X/L) research.microsoft.com/~cormac/Papers/PhishingAsTragedy.pdf (198, , X, X- R/X/L) www.gartner.com/it/page.jsp?id=565125 (198, , X, X- R/X/L) www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (198, , X, X- R/X/L) web.archive.org/web/20061205104430/http://www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (198, , X, X- R/X/L) www.pcworld.com/resource/article/0,aid,125956,pg,1,RSS,RSS,00.asp (198, , X, X- R/X/L) web.archive.org/web/20060616110238/http://www.pcworld.com/resource/article/0%2Caid%2C125956%2Cpg%2C1%2CRSS%2CRSS%2C00.asp (198, , X, X- R/X/L) www.browser-recon.info (198, , X, X- R/X/L)
  8. 2020-05-20 09:10:14 (UTC): User Havechin t • c • dc • l • ef • b • bl; (347) to Voice phishing (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishprotection.com/resources/phishing-prevention-best-practices/ (R/Xmeta/L- removed)
    Other links: www.phishprotection.com/resources/phishing-prevention-best-practices/ (347, 13, 1, 1- R/X/L)
  9. 2020-05-20 14:39:48 (UTC): User Phishing Prevention t • c • dc • l • ef • b • bl; (1) to User:Phishing Prevention (edit | talk | history | links | watch | logs) (diff - DELETED) - Link: www.phishprotection.com/resources/phishing-prevention-best-practices/ (R/Xmeta/L)
    Other links: www.phishprotection.com/resources/phishing-prevention-best-practices/ (1, 13, 1, 1- R/X/L)
  10. 2020-06-25 05:38:46 (UTC): User PPP786 t • c • dc • l • ef • b • bl; (9) to Anti-phishing software (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishprotection.com/resources/phishing-prevention-best-practices/ (R/Xmeta/L- removed)
    Other links: www.phishprotection.com/resources/phishing-prevention-best-practices/ (9, 13, 1, 1- R/X/L)
  11. 2020-07-05 12:28:52 (UTC): User 39.62.43.28 t • c • dc • l • ef • b • bl; (15) to Johnny DuPree (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishprotection.com/resources/phishing-prevention-best-practices/ (R/Xmeta/L- removed)
    Other links: www.phishprotection.com/resources/phishing-prevention-best-practices/ (15, 13, 2, 1- R/X/L)
  12. 2020-07-05 12:47:38 (UTC): User 39.62.43.28 t • c • dc • l • ef • b • bl; (15) to Johnny DuPree (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishprotection.com/resources/phishing-prevention-best-practices/ (R/Xmeta/L- removed)
    Other links: www.phishprotection.com/resources/phishing-prevention-best-practices/ (15, 13, 2, 1- R/X/L)
  • Displayed all 12 additions.