Phishing detection, prevention, and notification
First Claim
1. A method, comprising:
- receiving content from a network-based resource;
rendering a user interface of a Web browsing application to display the content received from the network-based resource;
detecting a phishing attack in the content by at least one of determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.
2 Assignments
0 Petitions
Accused Products
Abstract
Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication, such as an email message, from a domain. A phishing detection module detects a phishing attack in the communication by determining that the domain is similar to a known phishing domain, or by detecting suspicious network properties of the domain. In another embodiment, a Web browsing application receives content, such as data for a Web page, from a network-based resource, such as a Web site or domain. The Web browsing application initiates a display of the content, and a phishing detection module detects a phishing attack in the content by determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving content from a network-based resource;
rendering a user interface of a Web browsing application to display the content received from the network-based resource;
detecting a phishing attack in the content by at least one of determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method, comprising:
-
receiving content from a network-based resource;
rendering a user interface of a Web browsing application to display the content received from the network-based resource; and
detecting a phishing attack at least in part by examining the content for suspicious material. - View Dependent Claims (15, 16)
-
-
17. A system, comprising:
-
a Web browsing application configured to receive content from a network-based resource and initiate a display of the content; and
a phishing detection module configured to detect a phishing attack in the content at least in part by determining that a domain of the network-based resource is similar to a known phishing domain. - View Dependent Claims (18, 19, 20)
-
Specification