The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Pharming attacks - a sophisticated version of phishing attacks - aim to steal users' credentials by redirecting them to a fraudulent website using DNS-based techniques. Pharming attacks can be performed at the client-side or into the Internet, using complex and well designed techniques that make the attack often imperceptible to the user. With the deployment of broadband connections for Internet access,...
Phishing is a kind of online security attack where the attacker creates a replica of an existing web page to fool users in order to hack their personal, financial, or password data. The statistics today reveal that the current Anti-Phishing system has failed to prevent Phishing completely. In this paper an Anti-Phishing algorithm is proposed which is termed as Phish-Secure. Phish-Secure use the concept...
Web applications are a fundamental pillar of today's globalized world. Society depends and relies on them for business and daily life. However, web applications are under constant attack by hackers that exploit their vulnerabilities to access valuable assets and disrupt business. Many studies and reports on web application security problems analyze the victim's perspective by detailing the vulnerabilities...
Dakota State University has a unique computing environment. Every undergraduate student and professor has a school assigned tablet PC. In addition, it is the State of South Dakota's premier four year technology university. The university also hosts email, website, and website services for the state's K-12 program in addition to its own. The high use of the mobile computing environment serves as a...
Government agencies, researchers, and developers have worked to build distributed networks and systems enabling anonymous communication on the Internet. Within the last ten years, the maturation of these systems have enhanced the effectiveness and availability of anonymous communication, allowing criminals to electronically participate in illicit activities such as money laundering, child pornography,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.