Good writeup on UI spoofing attacks

2008-08-27 Thread Peter Gutmann
The Codinghorror blog has a good writeup on the level of sophistication of UI spoofing being used in phishing attacks, specifically how a web search for lilies leads to a pretty convincing social-engineering attack designed to get users to install their malware:

Good writeup on UI spoofing attacks

2008-08-23 Thread Peter Gutmann
The Codinghorror blog has a good writeup on the level of sophistication of UI spoofing being used in phishing attacks, specifically how a web search for lilies leads to a pretty convincing social-engineering attack designed to get users to install their malware: