Mobile Phishing Attacks and Mitigation Techniques

HTML  XML Download Download as PDF (Size: 605KB)  PP. 206-212  
DOI: 10.4236/jis.2015.63021    9,287 Downloads   14,719 Views  Citations

ABSTRACT

Mobile devices have taken an essential role in the portable computer world. Portability, small screen size, and lower cost of production make these devices popular replacements for desktop and laptop computers for many daily tasks, such as surfing on the Internet, playing games, and shopping online. The popularity of mobile devices such as tablets and smart phones has made them a frequent target of traditional web-based attacks, especially phishing. Mobile device-based phishing takes its share of the pie to trick users into entering their credentials in fake websites or fake mobile applications. This paper discusses various phishing attacks using mobile devices followed by some discussion on countermeasures. The discussion is intended to bring more awareness to emerging mobile device-based phishing attacks.

Share and Cite:

Shahriar, H. , Klintic, T. and Clincy, V. (2015) Mobile Phishing Attacks and Mitigation Techniques. Journal of Information Security, 6, 206-212. doi: 10.4236/jis.2015.63021.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.