informatics logo cs logo
phishhook
cacr logo

apwg logo

i3p


iu seal

Phishing @ IU in the news

(15 February 2007)

By Andrea Quong, Red Herring.
The new twist, according to Markus Jakobsson and Sid Stamm of Indiana University's School of Informatics in Bloomington and Zulfikar Ramzan of Symantec, is that this type of attack is a cinch to carry out from the inside--by changing the settings on home network broadband routers.
[ Read more... ]

(29 January 2007)

By BankInfoSecurity, BankInfo Security.
Listen to BankInfoSecurity's latest podcast as a leading phishing researcher explains some of his newest findings on phishing. Dr. Markus Jakobsson is ...
[ Read more... ]

(20 October 2006)

By Will Knight, New Scientist.
Markus Jakobsson and Jacob Ratkiewicz at Indiana University, US, suspected this was an underestimation. The reasoned that some survey participants may not have realised that they have been stung by a phishing scam, or may simply be too embarrassed to admit to it.
[ Read more... ]

(19 October 2006)

By Network World Staff, Network World.
The researchers tempered its findings about a surprisingly high number of phishing victims by noting that other research, such as a Gartner report that says about 3% of American adults are successfully targeted, might not take enough into account the number of people who won't admit to being duped.
[ Read more... ]

(16 July 2006)

By Laura Gunderson, The Oregonian.
Some fraudsters who didn't want to pay figured out how to send e-mails to America Online customers that looked as if they were from the company's billing department, said Jacob Ratkiewicz, a computer security researcher at Indiana University. To keep AOL accounts active, the fake e-mails warned, users had to respond with user names and passwords.
[ Read more... ]

(29 June 2006)

By Steve Hinnefeld, The Herald-Times.
Fred Cate, a law professor and director of Indiana University's Center for Applied Cybersecurity Research, said online attacks still account for only a bit of the broad category of crime called identity theft. But Cate said cyber-anglers are getting more effective.
[ Read more... ]

(27 June 2006)

By Network World Staff, NetworkWorld.com.
An Indiana University scientist is behind a new company called RavenWhite that is exploiting cookie technology to protect Web users from identity theft and other online threats.
[ Read more... ]

(22 June 2006)

By Trevor Brown, IDS News.
Tsow said after reviewing the fraudulent e-mail it appears "pretty unsophisticated based on today's standards" as it is not as threatening as other large scale Internet frauds. However, he said this illustrates a growing trend of smaller companies and banks being attacked as they generally do less to educate consumers and attacks are less noticed as they tend to "fly under the radar" before it's too late.
[ Read more... ]

(22 February 2006)

By Sonia Rana, IDS News.
Alex Tsow, a graduate student of computer science, has conducted research that shows students should not only be wary of suspicious "phishing" e-mails, but also of suspicious hardware that can perpetuate the attacks.
[ Read more... ]

(17 January 2006)

By Michael Zennie, IDS News.
But, there was one key difference. Stamm's Web site had a gaping security flaw which could have allowed him to corrupt any system that played the video.
[ Read more... ]

(17 October 2005)

By Steve Bray, Wish TV.
Markus Jakobsson, assistant director of IU's Center of Applied Cybersecurity Research, says if a potential thief can figure out what bank you use or which websites you visit, you could be an easy target for a scam called phishing.
[ Read more... ]