Web: http://arxiv.org/abs/2204.13054

April 28, 2022, 1:20 a.m. | Trevor Wood, Vitor Basto-Fernandes, Eerke Boiten, Iryna Yevseyeva

cs.CR updates on arXiv.org arxiv.org

Most research into anti-phishing defence assumes that the mal-actor is
attempting to harvest end-users' personally identifiable information or login
credentials and, hence, focuses on detecting phishing websites. The defences
for this type of attack are usually activated after the end-user clicks on a
link, at which point the link is checked. This is known as after-the-click
detection. However, more sophisticated phishing attacks (such as spear-phishing
and whaling) are rarely designed to get the end-user to visit a website.
Instead, they …

anti-phishing application detection email phishing review

Senior Security Engineer

@ Plentific, Ltd. | London, England, United Kingdom

Vulnerability Importer

@ Flashpoint | Remote

Computer Systems Security Analyst

@ IT Concepts Inc. | Woodlawn, Maryland, United States

[Coupang Pay] Information Security Engineer

@ Coupang | Seoul, South Korea

Senior Product Security Engineer

@ Panther Labs | United States

Lead, DevSecOps

@ Hex Trust | Singapore, Singapore, Singapore

Information Security GRC Lead

@ Bud | London, England, United Kingdom

Security Analyst

@ AnaVation | Quantico, VA

Security Engineer

@ Homebase | Atlanta, Georgia, United States

Principal Offensive Cloud Security Engineer

@ Uptycs | Remote, USA

Security Engineer

@ AnaVation | Quantico, VA

Information Systems Security Manager

@ Barbaricum | Washington, DC