Contact Us
Article
Hacker Tools New Update | Download Directory |
| Windows | Linux | Mac OS X | Mobile | Assessment | Defense | Documents | Miscellaneous |
Hacker Tools » Download -> Assessment-> Windows » An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks

This Directory TOP
WinArpAttacker
WLAN Decrypter
Cable Modem Sniffer
lbrute.zip
SuperScan v4.0
sec_cloak.zip
password_dictionary.rar
JAAScois Anti-WebInjection
Windows Password Expert
Nessus Remote Security Scanner 2.2.4
Process Hacker 2.25
"Network Behind a Network" Scenarios
Collapse Web Application Scanner
JAAScois X-Code v1.0 PHP Version
nhs (nohack scanner) v0.23.0
Managing Windows Vista Group Policy (Part 2)
Controlling Privileges of the Administrator Accounts
Using Advanced Group Policy Management to Protect your GPOs
Engage Packet builder
Securing DNS for Windows - Part 1
Securing Printer Usage in Windows Server 2003 (Part 2)
How to Configure BitLocker
smac20_setup.exe
A Microsoft PKI Quick Guide - Part 1: Planning
chntpw-source-040116.zip
proxmark3.zip
Default Deny All Applications (Part 1)
NBTEnum33.zip
A Best Practice Guide on How to Configure BitLocker (Part 1)
smbrelay3 11.15
winappdbg-1.4
Xprobe2 0.2
Search

An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks

File Size: KB
Developer: http://www.usablesecurity.org
Description:     In this usability study of phishing attacks and browser antiphishing defenses, 27 users each classified 12 web sites as fraudulent or legitimate. By dividing these users into three groups, our controlled study measured both the effect of extended validation certificates that appear only at legitimate sites and the effect of reading a help file about security features in Internet Explorer 7.
Download:   An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks

 

Sponsor Links

Sponsor Links

Share/Bookmark