phishing Questions

5

Solved

Suppose we have an application that acts as a middleman, allowing Company A to send reports to their customers. Company A → Company B (me) → Company A's customers After getting the report we send...
Mourant asked 18/1, 2011 at 19:54

2

Solved

With OAuth 2.0 PKCE Flow for Installed App (e.g. a desktop app/cli/client library), it seems that nothing is preventing an attacker to: obtain client_id by using the original app (client_id is pub...
Teethe asked 20/10, 2020 at 0:50

8

Solved

What are the best ways to prevent your website from being Phished? Please cite some technical suggestions and references if possible. Thank you!
Crunode asked 17/5, 2010 at 1:43

3

I have a payment application in my device, my application connect to that application's service to get a pending-intent for launch payment activity and then listen to result in onActivityResult() m...
Aphis asked 6/4, 2016 at 7:23

2

Solved

Main Question I am working on an API in Java that needs to detect the use of brands (e.g. PayPal, Mastercard etc.) in phishing emails. Obviously there are different strategies that the attackers ...
Ilocano asked 17/3, 2014 at 6:46

2

Solved

The Scenario: A web application that once a new user completes the registration, an email will be sent, containing a URL that once tapped from within an iOS device, the iOS app will be launched. T...
Laboratory asked 26/5, 2015 at 14:15

3

Solved

Imagine a scenario in which a game X installed on your mobile device wants to access your account information from social network Y. Assume that Y exposes some API, and have features like "login wi...
Lynda asked 15/9, 2012 at 17:18

3

Is there a service that lets me check a URL to see if it may possibly be a dangerous site? When a user exits our application by clicking on an untrusted link, we sent them through a "are you sure ...
Gottlieb asked 27/10, 2011 at 14:49

2

I have encountered the "Phishing Detected" warning in Chrome browser on my dev site. Interestingly I don't encounter the same warning in Firefox or Safari even though, as far I can tell, they are u...
Fanfaron asked 16/10, 2013 at 0:2

2

I am sending account activation email from my .net app. I set the from address to "[email protected]" and from name "xyz" where xyz is the name of the domain i.e. our website. It was not a p...
Drinkable asked 30/4, 2012 at 5:15

2

Solved

As seen in GitHub's blog, they've implemented HTML5's JavaScript pushState feature for tree browsing (for modern browsers), bringing AJAX navigation without Hash Bangs. The code is simple: $('#sl...
Durwood asked 31/5, 2011 at 21:50

3

Solved

I've noticed for a very long time that when you try to copy a link location or open a link on Facebook, it modifies the link and passes it through l.php. For example, I can be sent to http://w...
Kristeenkristel asked 26/8, 2011 at 14:10

6

Solved

Phishing is a very serious problem that we face. However, banks are the biggest targets. What methods can a bank use to protect its self from phishing attacks? What methods should someone use...
Jaxartes asked 20/6, 2010 at 20:49

4

Solved

I got very concerned reading this genius post by Aza Raskin. What are the non-browsers solutions to defend against TabNabbing? Are there any?
Marinemarinelli asked 19/6, 2010 at 23:44

4

Solved

A few of my non-IT coworkers opened a .html attachment in an email message that looks extremely suspicious. It resulted in a blank screen when it appears that some javascript code was run. <sc...
Martinet asked 10/6, 2010 at 7:6

6

I've been doing a fair bit of work with OAuth recently, and I have to say that I really like it. I like the concept, and I like how it provides a low barrier-of-entry for your users to connect up t...
Paresh asked 1/2, 2010 at 20:22
1

© 2022 - 2025 — McMap. All rights reserved.