Methods and systems for phishing detection and notification
First Claim
1. A machine-implemented method for detecting a phishing attack over a computer network, the method comprising:
- accessing a web page;
processing information associated with the web page;
setting a first condition in response to the processing step;
comparing the first condition to a set of conditions indicative of a phishing attack; and
informing a user of the phishing attack corresponding to the first condition.
3 Assignments
0 Petitions
Accused Products
Abstract
Various techniques are provided for detecting phishing attacks and notifying users of such attacks. In one example, a machine-implemented method can be provided for detecting a phishing attack over a computer network. A web page can be accessed and information associated with the web page can be processed. One or more conditions can be set in response to the processing. The conditions can be compared to a set of conditions indicative of a phishing attack. A user can then be informed of a potential phishing attack corresponding to the conditions through the display of an alert window and/or an icon. Such actions can also be performed in response to a user'"'"'s selection of a link appearing in an email message. Appropriate systems and/or computer readable media incorporating these features can also be provided.
-
Citations
21 Claims
-
1. A machine-implemented method for detecting a phishing attack over a computer network, the method comprising:
-
accessing a web page;
processing information associated with the web page;
setting a first condition in response to the processing step;
comparing the first condition to a set of conditions indicative of a phishing attack; and
informing a user of the phishing attack corresponding to the first condition. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for detecting a phishing attack over a computer network in communication with the system, the system comprising a computer for performing a method comprising the steps:
-
accessing a web page;
processing information associated with the web page;
setting a first condition in response to the processing step;
comparing the first condition to a set of conditions indicative of a phishing attack; and
informing a user of the phishing attack corresponding to the first condition. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer readable medium with software embodied therein, the software operable to perform a method for detecting a phishing attack over a computer network when run by a computer, the method comprising the steps:
-
accessing a web page;
processing information associated with the web page;
setting a first condition in response to the processing step;
comparing the first condition to a set of conditions indicative of a phishing attack; and
informing a user of the phishing attack corresponding to the first condition. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification