The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Homograph attacks are a very common type of security vulnerability on the Web. The attack aims to hide the domain name origin by switching some letters in the URL. As the Web evolves beyond the traditional base of English-speaking users, this kind of threat will increase significantly with the use of non-Latin scripts in the entire domain name. The recent introduction of Internationalized Domain Names...
Web technology is enhancing day by day. Starting with the static Web 1.0 in the early age of Internet and dynamic Web 2.0 in 2004, traditional systems are computerized and accessed online. Now, we are heading to the new generation of Web applications which is Web 3.0 and it is starting to come to the public's attention. As Web technologies advances, Internet violation also is increasing. In the Malaysian...
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet service providers (ISPs). For example, organizations such as the Russian business network (RBN), Atrivo (a.k.a., Intercage), McColo, and most recently, the triple fiber network (3FN) operated with impunity, providing a safe haven for Internet criminals for their own financial...
As fake Website developers become more innovative, so too must the tools used to protect Internet users. A proposed system combines a support vector machine classifier and a rich feature set derived from Website text, linkage, and images to better detect fraudulent sites.
Phishing is an act of identity theft aimed at acquiring sensitive information such as usernames, passwords, credit card detail etc., by masquerading as a trustworthy entity in an electronic communication. Phishers use a number of different social engineering mechanism such as spoofed e-mail to try to trick their victims. Data suggests that some of the phishing attacks have convinced up to 5% of their...
Parties of the cases concerning online market runners put forward their pleading and defense on the judgment. The judges rendered their judgments - sustain, and offered their argumentation. All these defense and argumentation go with the process of rhetoric. Exactly speaking, convincing others is the ultimate purpose, expressing their own claimed wordings. Herein the two Taobao cases give us a chance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.