Phishing Evolves: Analyzing the Enduring Cybercrime

Phishing, the fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity via electronic communication, has quickly evolved beyond low-skill schemes that relied on casting “a wide net.” Spear phishing attacks target a particular high-value individual utilizing so...

Full description

Saved in:  
Bibliographic Details
Main Author: Ghazi-Tehrani, Adam Kavon (Author)
Contributors: Pontell, Henry N.
Format: Electronic Article
Language:English
Published: 2021
In: Victims & offenders
Year: 2021, Volume: 16, Issue: 3, Pages: 316-342
Online Access: Volltext (Resolving-System)
Volltext (Verlag)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000naa a22000002 4500
001 1748567934
003 DE-627
005 20210218061544.0
007 cr uuu---uuuuu
008 210218s2021 xx |||||o 00| ||eng c
024 7 |a 10.1080/15564886.2020.1829224  |2 doi 
035 |a (DE-627)1748567934 
035 |a (DE-599)KXP1748567934 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Ghazi-Tehrani, Adam Kavon  |e VerfasserIn  |4 aut 
245 1 0 |a Phishing Evolves: Analyzing the Enduring Cybercrime 
264 1 |c 2021 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Phishing, the fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity via electronic communication, has quickly evolved beyond low-skill schemes that relied on casting “a wide net.” Spear phishing attacks target a particular high-value individual utilizing sophisticated techniques. This study aims to describe the current state of phishing, the expected technological advances and developments of the near future, and the best prevention and enforcement strategies. Data comes from interviews with approximately 60 information technology security professionals, “hackers,” and academic researchers. Routine Activity Theory provided an operational framework; while it is an imperfect fit for most crimes, it provides enough explanatory power for cyber-crimes. Interviewees mainly agreed: First, technological advances increase the proliferation of phishing attacks, but also aid in their detection. It has never been easier to conduct a simple attack, but a good attack requires more effort than ever before. Second, phishing is directly responsible financial fraud and, indirectly, as the primary attack vector for ransomware. Third, newer types of attacks utilizing technology, like deepfakes, will make the problem worse in the short-term. Fourth, prevention will come from machine learning and public education akin to WIFI security improvement via the combination of encryption and password awareness. 
650 4 |a Technology 
650 4 |a Routine Activities 
650 4 |a Theories 
650 4 |a Victimization 
700 1 |a Pontell, Henry N.  |d 1950-  |e VerfasserIn  |0 (DE-588)1046475614  |0 (DE-627)776493892  |0 (DE-576)162591616  |4 aut 
773 0 8 |i Enthalten in  |t Victims & offenders  |d London [u.a.] : Taylor & Francis, 2006  |g 16(2021), 3, Seite 316-342  |h Online-Ressource  |w (DE-627)512879672  |w (DE-600)2237556-9  |w (DE-576)272350850  |x 1556-4991  |7 nnns 
773 1 8 |g volume:16  |g year:2021  |g number:3  |g pages:316-342 
856 4 0 |u https://doi.org/10.1080/15564886.2020.1829224  |x Resolving-System  |3 Volltext 
856 4 0 |u https://www.tandfonline.com/doi/abs/10.1080/15564886.2020.1829224  |x Verlag  |3 Volltext 
935 |a mkri 
936 u w |d 16  |j 2021  |e 3  |h 316-342 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 3858493023 
LOK |0 003 DE-627 
LOK |0 004 1748567934 
LOK |0 005 20210218061544 
LOK |0 008 210218||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)KrimDok#2021-02-17#3205083A81841CCFBAE803BC4276C3FF07D9DF66 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a zota 
ORI |a SA-MARC-krimdoka001.raw