This is an automated report generated by COIBot.If your username appears here, it means that COIBot has been tracking a link that you have added to one or more articles. COIBot tracks links for one of the following "blacklist and monitor" reasons, which can be found above the actual records (if they are not there, the link is not monitored/blacklisted anymore): The link has been reported to e.g. Wikipedia talk:WikiProject Spam, Wikipedia:Conflict of interest/Noticeboard, or a spam-blacklist; The link has been blacklisted on User:XLinkBot (formerly User:SquelchBot) or on User:AntiSpamBot (retired) The link has been added by someone whose username is very similar to the domain being added; The IP related to the link is added by someone with an IP close to the IP of the link. Next to your username will be one of these reasons, or a percentage overlap of your username has with the domain of the added link. Your appearance there does not mean you or one of the other accounts named here have a conflict of interest with adding the link, or that you or one of the other accounts named here were spamming the link: it may very well be accidental overlap, or a good link that was picked up by the bot accidentily, or a good link which is nonetheless under investigation of Wikipedia:Conflict of interest/Noticeboard or Wikipedia:WikiProject Spam. For more information on the working of the bot, see the user page of COIBot. If you have further questions, notify COIBot's maintainer, Dirk Beetstra, or ask on Wikipedia talk:WikiProject Spam.



Links[edit]

Users[edit]

Additions[edit]

  1. 2014-05-27 11:15:59 (UTC): User WeatherFug t • c • dc • l • ef • b • bl; (31) to WOT Services (edit | talk | history | links | watch | logs) (diff  top?) - Link: www.phishtank.com/friends.php (R/Xmeta/L- still there)
    Other links: www.phishtank.com/friends.php (31, 70, 1, 1- R/X/L) thejournal.com/articles/2009/08/11/panda-security-against-intuition-offer-free-web-of-trust-browser-addon.aspx?sc_lang=en (31, 1408, X, X- R/X/L) www.reuters.com/article/2012/08/08/idUS142454+08-Aug-2012+BW20120808 (31, -1, X, X- R/X/L) blog.legitscript.com/2010/05/legitscript-web-of-trust-announce-partnership/ (31, 15, 1, 1- R/X/L) msmvps.com/blogs/donna/archive/2008/07/06/web-of-trust-wot-is-now-using-hphosts-database.aspx (31, 346, 1, 0- R/X/L) www.facebook.com/notes/facebook-security/keeping-you-safe-from-scams-and-spam/10150174826745766 (31, -1, X, X- R/X/L)
  2. 2014-06-09 06:48:21 (UTC): w:fr:User:Hippo75 (t - c; 5910) to w:fr:PhishTank (diff  top?) - Link: www.phishtank.com (R/Xmeta/L- still there)
    Other links: books.google.fr/books?id=5haBqCvH1mkC&pg=SA5-PA10&lpg=SA5-PA10&dq=PhishTank&source=bl&ots=FVOWJa2Pq_&sig=M5nD2mNPR_oO14B9D8fPhz7lLzk&hl=fr&sa=X&ei=HViVU_-zJMbPOc6AgbgO&ved=0CHsQ6AEwCTgU#v=onepage&q=PhishTank&f=false (5910, -1, X, X- R/X/L) www.phishtank.com (5910, 70, 1, 1- R/X/L)
  3. 2014-10-04 20:20:24 (UTC): User Dawn Bard t • c • dc • l • ef • b • bl; (9497) to Phishing (edit | talk | history | links | watch | logs) (diff  top?) - Link: www.phishtank.com (R/Xmeta/L- still there)
    Other links: web.archive.org/web/20080324080028/http://www.csoonline.com/talkback/071905.html (9497, -1, X, X- R/X/L) www.met.police.uk/fraudalert/docs/internet_bank_fraud.pdf (9497, , X, X- R/X/L) www.webcitation.org/5ndG8erWg (9497, -1, X, X- R/X/L) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (9497, , X, X- R/X/L) www.techweb.com/wire/security/186701001 (9497, , X, X- R/X/L) www.webcitation.org/5w9Z7NfVB (9497, -1, X, X- R/X/L) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (9497, , X, X- R/X/L) www.eweek.com/article2/0,1895,2082039,00.asp (9497, , X, X- R/X/L) www.webcitation.org/5w9Z5zOVh (9497, -1, X, X- R/X/L) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (9497, , X, X- R/X/L) www.webcitation.org/5w9Z4mv7k (9497, -1, X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (9497, , X, X- R/X/L) news.bbc.co.uk/1/hi/technology/3608943.stm (9497, , X, X- R/X/L) www.webcitation.org/5w9Z2iACi (9497, -1, X, X- R/X/L) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (9497, , X, X- R/X/L) www.powershow.com/view1/1f004e-NzY0N/The_use_of_Optical_Character_Recognition_OCR_software_in_spam_filtering_powerpoint_ppt_presentation (9497, , X, X- R/X/L) www.webcitation.org/5w9YzPsN0 (9497, -1, X, X- R/X/L) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (9497, , X, X- R/X/L) www.theregister.co.uk/2007/12/12/phishing_redirection/ (9497, , X, X- R/X/L) q.queso.com/archives/001617 (9497, , X, X- R/X/L) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (9497, , X, X- R/X/L) dx.doi.org/10.1145%2F503124.503156 (9497, , X, X- R/X/L) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (9497, , X, X- R/X/L) www.shmoo.com/idn/homograph.txt (9497, , X, X- R/X/L) www.hsbcusa.com/security/recognize_fraud.html (9497, , X, X- R/X/L) www.thoughtcrime.org/software/sslstrip/. (9497, , X, X- R/X/L) www.webcitation.org/5w9YcgvUb (9497, -1, X, X- R/X/L) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (9497, , X, X- R/X/L) www.firmex.com/blog/spear-phishing-whos-getting-caught/ (9497, , X, X- R/X/L) www.microsoft.com/canada/athome/security/email/spear_phishing.mspx (9497, , X, X- R/X/L) www.bbc.com/news/technology-25506020 (9497, , X, X- R/X/L) www.youtube.com/watch?v=fzXclG_c5Sk (9497, -1, X, X- R/X/L) www.fraudwatchinternational.com (9497, , X, X- R/X/L) www.webcitation.org/5QVOm5OO1 (9497, -1, X, X- R/X/L) www.millersmiles.co.uk (9497, , X, X- R/X/L) apwg.org/reports/apwg_report_Q3_2009.pdf (9497, 999999999, X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (9497, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (9497, , X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (9497, , X, X- R/X/L) www.webcitation.org/5gY2R1j1g (9497, -1, X, X- R/X/L) rapidshare.de/en/phishing.html (9497, , X, X- R/X/L) web.archive.org/web/20080430101024/http://rapidshare.de/en/phishing.html (9497, -1, X, X- R/X/L) dx.doi.org/10.1145%2F1290958.1290968 (9497, , X, X- R/X/L) dx.doi.org/10.1145/1290958.1290968 (9497, , X, X- R/X/L) www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (9497, , X, X- R/X/L) web.archive.org/web/20061205104430/http://www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (9497, -1, X, X- R/X/L) www.pcworld.com/resource/article/0,aid,125956,pg,1,RSS,RSS,00.asp (9497, , X, X- R/X/L) www.browser-recon.info (9497, , X, X- R/X/L) www.webcitation.org/5w9YXj9AJ (9497, -1, X, X- R/X/L) www.irs.gov/newsroom/article/0,,id=155682,00.html (9497, , X, X- R/X/L) www.prweb.com/releases/2014-Retailer-Hacks/Phishing-data-breach/prweb12167251.htm (9497, , X, X- R/X/L) www.prweb.com/releases/2014-Retailer-Hacks/Phishing-data-breach/prweb12167251.htm (9497, , X, X- R/X/L) krebsonsecurity.com/2014/09/data-nearly-all-u-s-home-depot-stores-hit/ (9497, , X, X- R/X/L) www.nytimes.com/2011/05/28/business/28hack.html (9497, , X, X- R/X/L) blogs.rsa.com/anatomy-of-an-attack/ (9497, , X, X- R/X/L) blogs.rsa.com/anatomy-of-an-attack/ (9497, , X, X- R/X/L) 247wallst.com/retail/2014/05/05/target-ceo-sacked/ (9497, , X, X- R/X/L) 247wallst.com/retail/2014/05/05/target-ceo-sacked/ (9497, , X, X- R/X/L) bringmethenews.com/2014/02/12/report-email-phishing-scam-led-to-target-breach/ (9497, , X, X- R/X/L) firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1272/1192 (9497, , X, X- R/X/L) www.webcitation.org/5w9YVyMYn (9497, -1, X, X- R/X/L) itmanagement.earthweb.com/secu/article.php/3451501 (9497, , X, X- R/X/L) financialcryptography.com/mt/archives/000609.html (9497, , X, X- R/X/L) www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?page=all (9497, , X, X- R/X/L) www.webcitation.org/5w9YV2fuL (9497, -1, X, X- R/X/L) www.rajuabju.com/warezirc/historyofaolwarez.htm (9497, , X, X- R/X/L) wired-vig.wired.com/news/technology/0,1282,9932,00.html (9497, , X, X- R/X/L) www.wordspy.com/words/phishing.asp (9497, , X, X- R/X/L) www.dodbuzz.com/2011/08/22/report-chinese-tv-doc-reveals-cyber-mischief/ (9497, , X, X- R/X/L) www.computerworld.com/s/article/9219155/Suspected_Chinese_spear_phishing_attacks_continue_to_hit_Gmail_users (9497, , X, X- R/X/L) arxiv.org/abs/1106.4692 (9497, , X, X- R/X/L) simson.net/clips/1995/95.SJMN.AOL_Hackers.html (9497, , X, X- R/X/L) www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf (9497, , X, X- R/X/L) www.microsoft.com/protect/yourself/phishing/engineering.mspx (9497, , X, X- R/X/L) isc.sans.org/diary.php?storyid=1905 (9497, 176, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html (9497, 469, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (9497, 469, X, X- R/X/L) books.google.com/books?id=I-9P1EkTkigC&pg=PA433 (9497, -1, X, X- R/X/L) pralab.diee.unica.it/sites/default/files/obf.jpg (9497, , X, X- R/X/L) www.yourbank.example.com (9497, , X, X- R/X/L) www.scamdex.com/Phishing-index.php (9497, , X, X- R/X/L) www.cl.cam.ac.uk/%7Ernc1/takedown.pdf (9497, -1, X, X- R/X/L) www.phishtank.com (9497, 70, X, X- R/X/L) research.microsoft.com/en-us/um/people/cormac/Papers/PhishingAsTragedy.pdf (9497, -1, X, X- R/X/L) www.honeynet.org/papers/phishing/ (9497, 309, X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (9497, 999999999, X, X- R/X/L) www.utica.edu/academic/institutes/cimip/ (9497, 999999999, X, X- R/X/L) www.AntiPhishing.org (9497, , X, X- R/X/L) anyfreehack.com/pdf/jakobsson.pdf (9497, , X, X- R/X/L) www.informationweek.com/story/showArticle.jhtml?articleID=199903450 (9497, , X, X- R/X/L) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (9497, , X, X- R/X/L) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (9497, , X, X- R/X/L) www.pcmag.com/article2/0,1895,2085183,00.asp (9497, , X, X- R/X/L) www.earthlink.net/about/press/pr_phishersite/ (9497, , X, X- R/X/L) web.archive.org/web/20070705211932/http://www.earthlink.net/about/press/pr_phishersite/ (9497, -1, X, X- R/X/L) www.washingtonpost.com/wp-dyn/articles/A40578-2005Apr9.html (9497, , X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+HB2471 (9497, , X, X- R/X/L) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (9497, , X, X- R/X/L) web.archive.org/web/20070131204118/http://media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (9497, -1, X, X- R/X/L) corp.aol.com/whoweare/history/2006.shtml (9497, , X, X- R/X/L) web.archive.org/web/20070522231137/http://www.corp.aol.com/whoweare/history/2006.shtml (9497, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (9497, , X, X- R/X/L) news.zdnet.co.uk/0,39020330,39258528,00.htm (9497, , X, X- R/X/L) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (9497, , X, X- R/X/L) web.archive.org/web/20051103190357/http://www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (9497, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (9497, , X, X- R/X/L) www.webcitation.org/61A2zw5D2 (9497, -1, X, X- R/X/L) www.opsi.gov.uk/ACTS/en2006/2006en35.htm (9497, , X, X- R/X/L) informationweek.com/story/showArticle.jhtml?articleID=60404811 (9497, , X, X- R/X/L) www.webcitation.org/5w9ZIR3zi (9497, -1, X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (9497, , X, X- R/X/L) www.cybercrime.gov/mantovaniIndict.htm (9497, , X, X- R/X/L) www.eweek.com/article2/0%2C1895%2C1831960%2C00.asp (9497, , X, X- R/X/L) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (9497, , X, X- R/X/L) www.cnn.com/2003/TECH/internet/07/21/phishing.scam/index.html (9497, , X, X- R/X/L) www.safesigner.com (9497, , X, X- R/X/L) consumerscams.org/scam_safety_tips/how_to_report_phishing_scam (9497, , X, X- R/X/L) www.google.com/safebrowsing/report_phish/ (9497, , X, X- R/X/L) www.ftc.gov/phonefraud (9497, , X, X- R/X/L) phonephishing.info (9497, , X, X- R/X/L) www.webcitation.org/5w9ZHYbnJ (9497, -1, X, X- R/X/L) www.schneier.com/blog/archives/2006/10/phishtank.html (9497, , X, X- R/X/L) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (9497, , X, X- R/X/L) www.webcitation.org/5w9ZGndsq (9497, -1, X, X- R/X/L) www.antiphishing.org/solutions.html#takedown (9497, , X, X- R/X/L) reports-archive.adm.cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf (9497, , X, X- R/X/L) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (9497, , X, X- R/X/L) web.archive.org/web/20080216101637/http://www.albany.edu/iasymposium/2006/chandrasekaran.pdf (9497, -1, X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1568494611002547 (9497, , X, X- R/X/L) www.inf.ufpr.br/lesoliveira/download/ASOC2011.pdf (9497, , X, X- R/X/L) www.confidenttechnologies.com/products/anti-phishing (9497, , X, X- R/X/L) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (9497, , X, X- R/X/L) web.archive.org/web/20080406062148/http://people.deas.harvard.edu/~rachna/papers/securityskins.pdf (9497, -1, X, X- R/X/L) www.schneier.com/blog/archives/2005/07/security_skins.html (9497, , X, X- R/X/L) www.ovum.com/news/euronews.asp?id=4166 (9497, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (9497, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=14384 (9497, , X, X- R/X/L) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (9497, , X, X- R/X/L) web.archive.org/web/20080406062148/http://www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (9497, -1, X, X- R/X/L) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (9497, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/AR2005071302181.html (9497, , X, X- R/X/L) www.webcitation.org/619zhkpkk (9497, -1, X, X- R/X/L) www.bankofamerica.com (9497, , X, X- R/X/L) www.eweek.com/article2/0,1759,1630161,00.asp (9497, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (9497, , X, X- R/X/L) www.webcitation.org/612DwHoBd (9497, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=99089&WT.svl=news1_1 (9497, , X, X- R/X/L) www.webcitation.org/5w9ZE56Uy (9497, -1, X, X- R/X/L) www.mozilla.org/security/phishing-test.html (9497, , X, X- R/X/L) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (9497, , X, X- R/X/L) www.3sharp.com/projects/antiphish/index.htm (9497, , X, X- R/X/L) web.archive.org/web/20080114211315/http://www.3sharp.com/projects/antiphish/index.htm (9497, -1, X, X- R/X/L) www.webcitation.org/619zh5NCV (9497, -1, X, X- R/X/L) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (9497, , X, X- R/X/L) www.webcitation.org/619zgMPR6 (9497, -1, X, X- R/X/L) www.mozilla.org/projects/bonecho/anti-phishing/ (9497, , X, X- R/X/L) www.webcitation.org/5mq3wifwd (9497, -1, X, X- R/X/L) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (9497, , X, X- R/X/L) financialcryptography.com/mt/archives/000645.html (9497, , X, X- R/X/L) financialcryptography.com/mt/archives/000645.html (9497, , X, X- R/X/L) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.HTM (9497, , X, X- R/X/L) www.unik.no/people/josang/papers/JP2005-AusCERT.pdf (9497, , X, X- R/X/L) www.pcworld.com/article/125739-1/article.html (9497, , X, X- R/X/L) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (9497, , X, X- R/X/L) www.zdnetindia.com/news/features/stories/126569.html (9497, , X, X- R/X/L) www.webcitation.org/5w9ZCK7Pk (9497, -1, X, X- R/X/L) www2006.org/programme/item.php?id=3533 (9497, , X, X- R/X/L) isc.incidents.org/diary.php?storyid=1194 (9497, , X, X- R/X/L) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (9497, , X, X- R/X/L) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (9497, , X, X- R/X/L) www.hexview.com/sdp/node/24 (9497, , X, X- R/X/L) web.archive.org/web/20080320035409/http://www.hexview.com/sdp/node/24 (9497, -1, X, X- R/X/L) online.wsj.com/public/article/0,,SB112424042313615131-z_8jLB2WkfcVtgdAWf6LRh733sg_20060817,00.html?mod=blogs (9497, , X, X- R/X/L) www.cylab.cmu.edu/files/cmucylab06017.pdf (9497, , X, X- R/X/L) dx.doi.org/10.1080%2F08824090701624239 (9497, , X, X- R/X/L) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (9497, , X, X- R/X/L) web.archive.org/web/20081028225500/http://www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (9497, -1, X, X- R/X/L) applications.boi.com/updates/Article?PR_ID=1430 (9497, , X, X- R/X/L) web.archive.org/web/20081007194413/http://applications.boi.com/updates/Article?PR_ID=1430 (9497, -1, X, X- R/X/L) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (9497, , X, X- R/X/L) news.biharprabha.com/2014/02/20-indians-are-victims-of-online-phishing-attacks-microsoft/ (9497, , X, X- R/X/L) www.theregister.co.uk/2005/05/03/aol_phishing/ (9497, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=15013 (9497, , X, X- R/X/L) research.microsoft.com/~cormac/Papers/PhishingAsTragedy.pdf (9497, -1, X, X- R/X/L) www.gartner.com/it/page.jsp?id=565125 (9497, , X, X- R/X/L) www.csoonline.com/talkback/071905.html (9497, , X, X- R/X/L)

    User is in trusted groups rollbacker, reviewer on some wikis
  4. 2015-02-25 13:48:59 (UTC): w:nl:User:12345danNL (t - c; 1114) to w:nl:PhishTank (diff  top?) - Link: www.phishtank.com (R/Xmeta/L- still there)
    Other links: www.phishtank.com/faq.php#whatisphishtank (1114, 70, X, X- R/X/L) www.phishtank.com (1114, 70, X, X- R/X/L)

    User is in a trusted group rollbacker on some wikis
  5. 2015-03-05 10:47:31 (UTC): User Babitaarora t • c • dc • l • ef • b • bl; (21846) to Phishing (edit | talk | history | links | watch | logs) (diff  top?) - Link: www.phishtank.com (R/Xmeta/L- still there)
    Other links: www.scamdex.com/Phishing-index.php (21846, , X, X- R/X/L) www.cl.cam.ac.uk/%7Ernc1/takedown.pdf (21846, -1, X, X- R/X/L) www.phishtank.com (21846, 70, X, X- R/X/L) research.microsoft.com/en-us/um/people/cormac/Papers/PhishingAsTragedy.pdf (21846, -1, X, X- R/X/L) www.honeynet.org/papers/phishing/ (21846, 309, X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (21846, 999999999, X, X- R/X/L) www.utica.edu/academic/institutes/cimip/ (21846, 999999999, X, X- R/X/L) www.AntiPhishing.org (21846, , X, X- R/X/L) www.informationweek.com/story/showArticle.jhtml?articleID=199903450 (21846, , X, X- R/X/L) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (21846, , X, X- R/X/L) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (21846, , X, X- R/X/L) www.pcmag.com/article2/0,1895,2085183,00.asp (21846, , X, X- R/X/L) www.earthlink.net/about/press/pr_phishersite/ (21846, , X, X- R/X/L) web.archive.org/web/20070705211932/http://www.earthlink.net/about/press/pr_phishersite/ (21846, -1, X, X- R/X/L) www.washingtonpost.com/wp-dyn/articles/A40578-2005Apr9.html (21846, , X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+HB2471 (21846, , X, X- R/X/L) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (21846, , X, X- R/X/L) web.archive.org/web/20070131204118/http://media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (21846, -1, X, X- R/X/L) corp.aol.com/whoweare/history/2006.shtml (21846, , X, X- R/X/L) web.archive.org/web/20070522231137/http://www.corp.aol.com/whoweare/history/2006.shtml (21846, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (21846, , X, X- R/X/L) news.zdnet.co.uk/0,39020330,39258528,00.htm (21846, , X, X- R/X/L) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (21846, , X, X- R/X/L) web.archive.org/web/20051103190357/http://www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (21846, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (21846, , X, X- R/X/L) www.webcitation.org/61A2zw5D2 (21846, -1, X, X- R/X/L) www.opsi.gov.uk/ACTS/en2006/2006en35.htm (21846, , X, X- R/X/L) informationweek.com/story/showArticle.jhtml?articleID=60404811 (21846, , X, X- R/X/L) www.webcitation.org/5w9ZIR3zi (21846, -1, X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (21846, , X, X- R/X/L) www.cybercrime.gov/mantovaniIndict.htm (21846, , X, X- R/X/L) www.eweek.com/article2/0%2C1895%2C1831960%2C00.asp (21846, , X, X- R/X/L) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (21846, , X, X- R/X/L) www.cnn.com/2003/TECH/internet/07/21/phishing.scam/index.html (21846, , X, X- R/X/L) www.forbes.com/sites/josephsteinberg/2014/08/25/why-you-are-at-risk-of-phishing-attacks-and-why-jp-morgan-chase-customers-were-targeted-this-week/ (21846, , X, X- R/X/L) www.safesigner.com (21846, , X, X- R/X/L) consumerscams.org/scam_safety_tips/how_to_report_phishing_scam (21846, , X, X- R/X/L) www.google.com/safebrowsing/report_phish/ (21846, , X, X- R/X/L) www.ftc.gov/phonefraud (21846, , X, X- R/X/L) www.webcitation.org/5w9ZHYbnJ (21846, -1, X, X- R/X/L) www.schneier.com/blog/archives/2006/10/phishtank.html (21846, , X, X- R/X/L) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (21846, , X, X- R/X/L) www.webcitation.org/5w9ZGndsq (21846, -1, X, X- R/X/L) www.antiphishing.org/solutions.html#takedown (21846, , X, X- R/X/L) reports-archive.adm.cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf (21846, , X, X- R/X/L) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (21846, , X, X- R/X/L) web.archive.org/web/20080216101637/http://www.albany.edu/iasymposium/2006/chandrasekaran.pdf (21846, -1, X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1568494611002547 (21846, , X, X- R/X/L) www.inf.ufpr.br/lesoliveira/download/ASOC2011.pdf (21846, , X, X- R/X/L) www.confidenttechnologies.com/products/anti-phishing (21846, , X, X- R/X/L) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (21846, , X, X- R/X/L) web.archive.org/web/20080406062148/http://people.deas.harvard.edu/~rachna/papers/securityskins.pdf (21846, -1, X, X- R/X/L) www.schneier.com/blog/archives/2005/07/security_skins.html (21846, , X, X- R/X/L) www.ovum.com/news/euronews.asp?id=4166 (21846, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (21846, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=14384 (21846, , X, X- R/X/L) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (21846, , X, X- R/X/L) web.archive.org/web/20080406062148/http://www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (21846, -1, X, X- R/X/L) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (21846, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/AR2005071302181.html (21846, , X, X- R/X/L) www.webcitation.org/619zhkpkk (21846, -1, X, X- R/X/L) www.bankofamerica.com (21846, , X, X- R/X/L) www.eweek.com/article2/0,1759,1630161,00.asp (21846, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (21846, , X, X- R/X/L) www.webcitation.org/612DwHoBd (21846, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=99089&WT.svl=news1_1 (21846, , X, X- R/X/L) www.webcitation.org/5w9ZE56Uy (21846, -1, X, X- R/X/L) www.mozilla.org/security/phishing-test.html (21846, , X, X- R/X/L) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (21846, , X, X- R/X/L) www.3sharp.com/projects/antiphish/index.htm (21846, , X, X- R/X/L) web.archive.org/web/20080114211315/http://www.3sharp.com/projects/antiphish/index.htm (21846, -1, X, X- R/X/L) www.webcitation.org/619zh5NCV (21846, -1, X, X- R/X/L) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (21846, , X, X- R/X/L) www.webcitation.org/619zgMPR6 (21846, -1, X, X- R/X/L) www.mozilla.org/projects/bonecho/anti-phishing/ (21846, , X, X- R/X/L) www.webcitation.org/5mq3wifwd (21846, -1, X, X- R/X/L) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (21846, , X, X- R/X/L) financialcryptography.com/mt/archives/000645.html (21846, , X, X- R/X/L) financialcryptography.com/mt/archives/000645.html (21846, , X, X- R/X/L) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.HTM (21846, , X, X- R/X/L) www.unik.no/people/josang/papers/JP2005-AusCERT.pdf (21846, , X, X- R/X/L) www.pcworld.com/article/125739-1/article.html (21846, , X, X- R/X/L) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (21846, , X, X- R/X/L) www.zdnetindia.com/news/features/stories/126569.html (21846, , X, X- R/X/L) www.webcitation.org/5w9ZCK7Pk (21846, -1, X, X- R/X/L) www2006.org/programme/item.php?id=3533 (21846, , X, X- R/X/L) isc.incidents.org/diary.php?storyid=1194 (21846, , X, X- R/X/L) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (21846, , X, X- R/X/L) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (21846, , X, X- R/X/L) web.archive.org/web/20070306 (21846, -1, X, X- R/X/L) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (21846, , X, X- R/X/L) www.hexview.com/sdp/node/24 (21846, , X, X- R/X/L) web.archive.org/web/20080320035409/http://www.hexview.com/sdp/node/24 (21846, -1, X, X- R/X/L) www.comodo.com/resources/home/phishing-scams.php (21846, , X, X- R/X/L) online.wsj.com/public/article/0,,SB112424042313615131-z_8jLB2WkfcVtgdAWf6LRh733sg_20060817,00.html?mod=blogs (21846, , X, X- R/X/L) www.cylab.cmu.edu/files/cmucylab06017.pdf (21846, , X, X- R/X/L) www.whichssl.com/antiphishing.html (21846, , X, X- R/X/L) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (21846, , X, X- R/X/L) web.archive.org/web/20081028225500/http://www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (21846, -1, X, X- R/X/L) applications.boi.com/updates/Article?PR_ID=1430 (21846, , X, X- R/X/L) web.archive.org/web/20081007194413/http://applications.boi.com/updates/Article?PR_ID=1430 (21846, -1, X, X- R/X/L) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (21846, , X, X- R/X/L) news.biharprabha.com/2014/02/20-indians-are-victims-of-online-phishing-attacks-microsoft/ (21846, , X, X- R/X/L) www.theregister.co.uk/2005/05/03/aol_phishing/ (21846, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=15013 (21846, , X, X- R/X/L) research.microsoft.com/~cormac/Papers/PhishingAsTragedy.pdf (21846, -1, X, X- R/X/L) www.gartner.com/it/page.jsp?id=565125 (21846, , X, X- R/X/L) www.csoonline.com/talkback/071905.html (21846, , X, X- R/X/L) web.archive.org/web/20080324080028/http://www.csoonline.com/talkback/071905.html (21846, -1, X, X- R/X/L) www.met.police.uk/fraudalert/docs/internet_bank_fraud.pdf (21846, , X, X- R/X/L) www.webcitation.org/5ndG8erWg (21846, -1, X, X- R/X/L) www.symantec.com/connect/blogs/covert-redirect-flaw-oauth-not-next-heartbleed (21846, , X, X- R/X/L) www.scmagazine.com/covert-redirect-vulnerability-impacts-oauth-20-openid/article/345407/ (21846, , X, X- R/X/L) news.yahoo.com/facebook-google-users-threatened-security-192547549.html (21846, , X, X- R/X/L) thehackernews.com/2014/05/nasty-covert-redirect-vulnerability.html (21846, , X, X- R/X/L) tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html (21846, , X, X- R/X/L) www.tomsguide.com/us/facebook-google-covert-redirect-flaw,news-18726.html (21846, , X, X- R/X/L) www.foxnews.com/tech/2014/05/05/facebook-google-users-threatened-by-new-security-flaw/ (21846, , X, X- R/X/L) www.cnet.com/news/serious-security-flaw-in-oauth-and-openid-discovered/ (21846, , X, X- R/X/L) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (21846, , X, X- R/X/L) web.archive.org/web/20050324073507/http://www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (21846, -1, X, X- R/X/L) www.techweb.com/wire/security/186701001 (21846, , X, X- R/X/L) www.webcitation.org/5w9Z7NfVB (21846, -1, X, X- R/X/L) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (21846, , X, X- R/X/L) www.eweek.com/article2/0,1895,2082039,00.asp (21846, , X, X- R/X/L) www.webcitation.org/5w9Z5zOVh (21846, -1, X, X- R/X/L) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (21846, , X, X- R/X/L) www.webcitation.org/5w9Z4mv7k (21846, -1, X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (21846, , X, X- R/X/L) news.bbc.co.uk/1/hi/technology/3608943.stm (21846, , X, X- R/X/L) www.webcitation.org/5w9Z2iACi (21846, -1, X, X- R/X/L) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (21846, , X, X- R/X/L) www.powershow.com/view1/1f004e-NzY0N/The_use_of_Optical_Character_Recognition_OCR_software_in_spam_filtering_powerpoint_ppt_presentation (21846, , X, X- R/X/L) www.webcitation.org/5w9YzPsN0 (21846, -1, X, X- R/X/L) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (21846, , X, X- R/X/L) www.theregister.co.uk/2007/12/12/phishing_redirection/ (21846, , X, X- R/X/L) q.queso.com/archives/001617 (21846, , X, X- R/X/L) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (21846, , X, X- R/X/L) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (21846, , X, X- R/X/L) www.shmoo.com/idn/homograph.txt (21846, , X, X- R/X/L) www.hsbcusa.com/security/recognize_fraud.html (21846, , X, X- R/X/L) www.thoughtcrime.org/software/sslstrip/. (21846, , X, X- R/X/L) www.webcitation.org/5w9YcgvUb (21846, -1, X, X- R/X/L) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (21846, , X, X- R/X/L) www.firmex.com/blog/spear-phishing-whos-getting-caught/ (21846, , X, X- R/X/L) www.microsoft.com/canada/athome/security/email/spear_phishing.mspx (21846, , X, X- R/X/L) www.emailanswers.com/2013/10/phishing-emails-unacceptable-failures-american-express/ (21846, , X, X- R/X/L) www.bbc.com/news/technology-25506020 (21846, , X, X- R/X/L) www.youtube.com/watch?v=fzXclG_c5Sk (21846, -1, X, X- R/X/L) www.fraudwatchinternational.com (21846, , X, X- R/X/L) www.webcitation.org/5QVOm5OO1 (21846, -1, X, X- R/X/L) www.millersmiles.co.uk (21846, , X, X- R/X/L) apwg.org/reports/apwg_report_Q3_2009.pdf (21846, 999999999, X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (21846, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (21846, , X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (21846, , X, X- R/X/L) www.webcitation.org/5gY2R1j1g (21846, -1, X, X- R/X/L) rapidshare.de/en/phishing.html (21846, , X, X- R/X/L) web.archive.org/web/20080430101024/http://rapidshare.de/en/phishing.html (21846, -1, X, X- R/X/L) dx.doi.org/10.1145/1290958.1290968 (21846, , X, X- R/X/L) www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (21846, , X, X- R/X/L) web.archive.org/web/20061205104430/http://www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (21846, -1, X, X- R/X/L) www.pcworld.com/resource/article/0,aid,125956,pg,1,RSS,RSS,00.asp (21846, , X, X- R/X/L) www.browser-recon.info (21846, , X, X- R/X/L) www.webcitation.org/5w9YXj9AJ (21846, -1, X, X- R/X/L) www.irs.gov/newsroom/article/0,,id=155682,00.html (21846, , X, X- R/X/L) www.icann.org/news (21846, , X, X- R/X/L) www.icann.org/news (21846, , X, X- R/X/L) www.icann.org/news/announcement-2-2014-12-16-en (21846, , X, X- R/X/L) www.prweb.com/releases/2014-Retailer-Hacks/Phishing-data-breach/prweb12167251.htm (21846, , X, X- R/X/L) krebsonsecurity.com/2014/09/data-nearly-all-u-s-home-depot-stores-hit/ (21846, , X, X- R/X/L) www.nytimes.com/2011/05/28/business/28hack.html (21846, , X, X- R/X/L) blogs.rsa.com/anatomy-of-an-attack/ (21846, , X, X- R/X/L) 247wallst.com/retail/2014/05/05/target-ceo-sacked/ (21846, , X, X- R/X/L) bringmethenews.com/2014/02/12/report-email-phishing-scam-led-to-target-breach/ (21846, , X, X- R/X/L) firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1272/1192 (21846, , X, X- R/X/L) www.webcitation.org/5w9YVyMYn (21846, -1, X, X- R/X/L) itmanagement.earthweb.com/secu/article.php/3451501 (21846, , X, X- R/X/L) financialcryptography.com/mt/archives/000609.html (21846, , X, X- R/X/L) www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?page=all (21846, , X, X- R/X/L) www.webcitation.org/5w9YV2fuL (21846, -1, X, X- R/X/L) www.rajuabju.com/warezirc/historyofaolwarez.htm (21846, , X, X- R/X/L) wired-vig.wired.com/news/technology/0,1282,9932,00.html (21846, , X, X- R/X/L) www.wordspy.com/words/phishing.asp (21846, , X, X- R/X/L) www.dodbuzz.com/2011/08/22/report-chinese-tv-doc-reveals-cyber-mischief/ (21846, , X, X- R/X/L) www.computerworld.com/s/article/9219155/Suspected_Chinese_spear_phishing_attacks_continue_to_hit_Gmail_users (21846, , X, X- R/X/L) arxiv.org/archive/cs.CR (21846, , X, X- R/X/L) arxiv.org/abs/1106.4692 (21846, , X, X- R/X/L) simson.net/clips/1995/95.SJMN.AOL_Hackers.html (21846, , X, X- R/X/L) www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf (21846, , X, X- R/X/L) www.microsoft.com/protect/yourself/phishing/engineering.mspx (21846, , X, X- R/X/L) isc.sans.org/diary.php?storyid=1905 (21846, 176, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html (21846, 469, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (21846, 469, X, X- R/X/L) books.google.com/books?id=I-9P1EkTkigC&pg=PA433 (21846, -1, X, X- R/X/L) pralab.diee.unica.it/sites/default/files/obf.jpg (21846, , X, X- R/X/L) www.yourbank.example.com (21846, , X, X- R/X/L)
  6. 2015-03-27 11:37:51 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Phishing (edit | talk | history | links | watch | logs) (diff  top?) - Link: www.phishtank.com (R/Xmeta/L- still there)
    Other links: consumerscams.org/scam_safety_tips/how_to_report_phishing_scam (-1, , X, X- R/X/L) www.yourbank.example.com (-1, , X, X- R/X/L) www.google.com/safebrowsing/report_phish/ (-1, , X, X- R/X/L) www.ftc.gov/phonefraud (-1, , X, X- R/X/L) www.webcitation.org/5w9ZHYbnJ (-1, -1, X, X- R/X/L) www.schneier.com/blog/archives/2006/10/phishtank.html (-1, , X, X- R/X/L) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1, , X, X- R/X/L) www.webcitation.org/5w9ZGndsq (-1, -1, X, X- R/X/L) www.antiphishing.org/solutions.html#takedown (-1, , X, X- R/X/L) reports-archive.adm.cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf (-1, , X, X- R/X/L) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080216101637/http://www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1, -1, X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1568494611002547 (-1, , X, X- R/X/L) www.inf.ufpr.br/lesoliveira/download/ASOC2011.pdf (-1, , X, X- R/X/L) www.confidenttechnologies.com/products/anti-phishing (-1, , X, X- R/X/L) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080406062148/http://people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1, -1, X, X- R/X/L) www.schneier.com/blog/archives/2005/07/security_skins.html (-1, , X, X- R/X/L) www.ovum.com/news/euronews.asp?id=4166 (-1, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=14384 (-1, , X, X- R/X/L) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080406062148/http://www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1, -1, X, X- R/X/L) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/AR2005071302181.html (-1, , X, X- R/X/L) www.webcitation.org/619zhkpkk (-1, -1, X, X- R/X/L) www.bankofamerica.com (-1, , X, X- R/X/L) www.eweek.com/article2/0,1759,1630161,00.asp (-1, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1, , X, X- R/X/L) www.webcitation.org/612DwHoBd (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=99089&WT.svl=news1_1 (-1, , X, X- R/X/L) www.webcitation.org/5w9ZE56Uy (-1, -1, X, X- R/X/L) www.mozilla.org/security/phishing-test.html (-1, , X, X- R/X/L) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1, , X, X- R/X/L) www.3sharp.com/projects/antiphish/index.htm (-1, , X, X- R/X/L) web.archive.org/web/20080114211315/http://www.3sharp.com/projects/antiphish/index.htm (-1, -1, X, X- R/X/L) www.webcitation.org/619zh5NCV (-1, -1, X, X- R/X/L) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (-1, , X, X- R/X/L) www.webcitation.org/619zgMPR6 (-1, -1, X, X- R/X/L) www.mozilla.org/projects/bonecho/anti-phishing/ (-1, , X, X- R/X/L) www.webcitation.org/5mq3wifwd (-1, -1, X, X- R/X/L) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1, , X, X- R/X/L) financialcryptography.com/mt/archives/000645.html (-1, , X, X- R/X/L) financialcryptography.com/mt/archives/000645.html (-1, , X, X- R/X/L) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.HTM (-1, , X, X- R/X/L) www.unik.no/people/josang/papers/JP2005-AusCERT.pdf (-1, , X, X- R/X/L) www.pcworld.com/article/125739-1/article.html (-1, , X, X- R/X/L) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (-1, , X, X- R/X/L) www.zdnetindia.com/news/features/stories/126569.html (-1, , X, X- R/X/L) www.webcitation.org/5w9ZCK7Pk (-1, -1, X, X- R/X/L) www2006.org/programme/item.php?id=3533 (-1, , X, X- R/X/L) isc.incidents.org/diary.php?storyid=1194 (-1, , X, X- R/X/L) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (-1, , X, X- R/X/L) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (-1, , X, X- R/X/L) web.archive.org/web/20070306 (-1, -1, X, X- R/X/L) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (-1, , X, X- R/X/L) www.hexview.com/sdp/node/24 (-1, , X, X- R/X/L) web.archive.org/web/20080320035409/http://www.hexview.com/sdp/node/24 (-1, -1, X, X- R/X/L) www.comodo.com/resources/home/phishing-scams.php (-1, , X, X- R/X/L) online.wsj.com/public/article/0,,SB112424042313615131-z_8jLB2WkfcVtgdAWf6LRh733sg_20060817,00.html?mod=blogs (-1, , X, X- R/X/L) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1, , X, X- R/X/L) www.whichssl.com/antiphishing.html (-1, , X, X- R/X/L) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1, , X, X- R/X/L) web.archive.org/web/20081028225500/http://www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1, -1, X, X- R/X/L) applications.boi.com/updates/Article?PR_ID=1430 (-1, , X, X- R/X/L) web.archive.org/web/20081007194413/http://applications.boi.com/updates/Article?PR_ID=1430 (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1, , X, X- R/X/L) news.biharprabha.com/2014/02/20-indians-are-victims-of-online-phishing-attacks-microsoft/ (-1, , X, X- R/X/L) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=15013 (-1, , X, X- R/X/L) research.microsoft.com/~cormac/Papers/PhishingAsTragedy.pdf (-1, -1, X, X- R/X/L) www.gartner.com/it/page.jsp?id=565125 (-1, , X, X- R/X/L) www.csoonline.com/talkback/071905.html (-1, , X, X- R/X/L) web.archive.org/web/20080324080028/http://www.csoonline.com/talkback/071905.html (-1, -1, X, X- R/X/L) www.met.police.uk/fraudalert/docs/internet_bank_fraud.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ndG8erWg (-1, -1, X, X- R/X/L) www.symantec.com/connect/blogs/covert-redirect-flaw-oauth-not-next-heartbleed (-1, , X, X- R/X/L) www.scmagazine.com/covert-redirect-vulnerability-impacts-oauth-20-openid/article/345407/ (-1, , X, X- R/X/L) news.yahoo.com/facebook-google-users-threatened-security-192547549.html (-1, , X, X- R/X/L) thehackernews.com/2014/05/nasty-covert-redirect-vulnerability.html (-1, , X, X- R/X/L) tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html (-1, , X, X- R/X/L) www.tomsguide.com/us/facebook-google-covert-redirect-flaw,news-18726.html (-1, , X, X- R/X/L) www.foxnews.com/tech/2014/05/05/facebook-google-users-threatened-by-new-security-flaw/ (-1, , X, X- R/X/L) www.cnet.com/news/serious-security-flaw-in-oauth-and-openid-discovered/ (-1, , X, X- R/X/L) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1, , X, X- R/X/L) web.archive.org/web/20050324073507/http://www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1, -1, X, X- R/X/L) www.techweb.com/wire/security/186701001 (-1, , X, X- R/X/L) www.webcitation.org/5w9Z7NfVB (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1, , X, X- R/X/L) www.eweek.com/article2/0,1895,2082039,00.asp (-1, , X, X- R/X/L) www.webcitation.org/5w9Z5zOVh (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1, , X, X- R/X/L) www.webcitation.org/5w9Z4mv7k (-1, -1, X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/technology/3608943.stm (-1, , X, X- R/X/L) www.webcitation.org/5w9Z2iACi (-1, -1, X, X- R/X/L) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1, , X, X- R/X/L) www.powershow.com/view1/1f004e-NzY0N/The_use_of_Optical_Character_Recognition_OCR_software_in_spam_filtering_powerpoint_ppt_presentation (-1, , X, X- R/X/L) www.webcitation.org/5w9YzPsN0 (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1, , X, X- R/X/L) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1, , X, X- R/X/L) q.queso.com/archives/001617 (-1, , X, X- R/X/L) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1, , X, X- R/X/L) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (-1, , X, X- R/X/L) www.shmoo.com/idn/homograph.txt (-1, , X, X- R/X/L) www.hsbcusa.com/security/recognize_fraud.html (-1, , X, X- R/X/L) www.thoughtcrime.org/software/sslstrip/. (-1, , X, X- R/X/L) www.webcitation.org/5w9YcgvUb (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1, , X, X- R/X/L) www.firmex.com/blog/spear-phishing-whos-getting-caught/ (-1, , X, X- R/X/L) www.microsoft.com/canada/athome/security/email/spear_phishing.mspx (-1, , X, X- R/X/L) www.emailanswers.com/2013/10/phishing-emails-unacceptable-failures-american-express/ (-1, , X, X- R/X/L) www.bbc.com/news/technology-25506020 (-1, , X, X- R/X/L) www.youtube.com/watch?v=fzXclG_c5Sk (-1, -1, X, X- R/X/L) www.fraudwatchinternational.com (-1, , X, X- R/X/L) www.webcitation.org/5QVOm5OO1 (-1, -1, X, X- R/X/L) www.millersmiles.co.uk (-1, , X, X- R/X/L) apwg.org/reports/apwg_report_Q3_2009.pdf (-1, 999999999, X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (-1, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (-1, , X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (-1, , X, X- R/X/L) www.webcitation.org/5gY2R1j1g (-1, -1, X, X- R/X/L) rapidshare.de/en/phishing.html (-1, , X, X- R/X/L) web.archive.org/web/20080430101024/http://rapidshare.de/en/phishing.html (-1, -1, X, X- R/X/L) dx.doi.org/10.1145/1290958.1290968 (-1, , X, X- R/X/L) www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (-1, , X, X- R/X/L) web.archive.org/web/20061205104430/http://www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (-1, -1, X, X- R/X/L) www.pcworld.com/resource/article/0,aid,125956,pg,1,RSS,RSS,00.asp (-1, , X, X- R/X/L) www.browser-recon.info (-1, , X, X- R/X/L) www.webcitation.org/5w9YXj9AJ (-1, -1, X, X- R/X/L) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1, , X, X- R/X/L) www.icann.org/news (-1, , X, X- R/X/L) www.icann.org/news (-1, , X, X- R/X/L) www.icann.org/news/announcement-2-2014-12-16-en (-1, , X, X- R/X/L) www.prweb.com/releases/2014-Retailer-Hacks/Phishing-data-breach/prweb12167251.htm (-1, , X, X- R/X/L) krebsonsecurity.com/2014/09/data-nearly-all-u-s-home-depot-stores-hit/ (-1, , X, X- R/X/L) www.nytimes.com/2011/05/28/business/28hack.html (-1, , X, X- R/X/L) blogs.rsa.com/anatomy-of-an-attack/ (-1, , X, X- R/X/L) 247wallst.com/retail/2014/05/05/target-ceo-sacked/ (-1, , X, X- R/X/L) bringmethenews.com/2014/02/12/report-email-phishing-scam-led-to-target-breach/ (-1, , X, X- R/X/L) firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1272/1192 (-1, , X, X- R/X/L) www.scamdex.com/Phishing-index.php (-1, , X, X- R/X/L) www.cl.cam.ac.uk/%7Ernc1/takedown.pdf (-1, -1, X, X- R/X/L) aiocheats.com/outil-generateur-de-credits-et-points-fifa15.html (-1, , X, X- R/X/L) www.phishtank.com (-1, 70, X, X- R/X/L) research.microsoft.com/en-us/um/people/cormac/Papers/PhishingAsTragedy.pdf (-1, -1, X, X- R/X/L) www.honeynet.org/papers/phishing/ (-1, 309, X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1, 999999999, X, X- R/X/L) www.utica.edu/academic/institutes/cimip/ (-1, 999999999, X, X- R/X/L) www.AntiPhishing.org (-1, , X, X- R/X/L) www.thebigcomputing.com/2015/01/phishing/ (-1, , X, X- R/X/L) www.thebigcomputing.com/2015/01/phishing/ (-1, , X, X- R/X/L) www.informationweek.com/story/showArticle.jhtml?articleID=199903450 (-1, , X, X- R/X/L) www.webcitation.org/5w9YVyMYn (-1, -1, X, X- R/X/L) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1, , X, X- R/X/L) itmanagement.earthweb.com/secu/article.php/3451501 (-1, , X, X- R/X/L) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1, , X, X- R/X/L) financialcryptography.com/mt/archives/000609.html (-1, , X, X- R/X/L) www.pcmag.com/article2/0,1895,2085183,00.asp (-1, , X, X- R/X/L) www.earthlink.net/about/press/pr_phishersite/ (-1, , X, X- R/X/L) web.archive.org/web/20070705211932/http://www.earthlink.net/about/press/pr_phishersite/ (-1, -1, X, X- R/X/L) www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?page=all (-1, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/articles/A40578-2005Apr9.html (-1, , X, X- R/X/L) www.webcitation.org/5w9YV2fuL (-1, -1, X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+HB2471 (-1, , X, X- R/X/L) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1, , X, X- R/X/L) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1, , X, X- R/X/L) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1, , X, X- R/X/L) www.wordspy.com/words/phishing.asp (-1, , X, X- R/X/L) web.archive.org/web/20070131204118/http://media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1, -1, X, X- R/X/L) www.dodbuzz.com/2011/08/22/report-chinese-tv-doc-reveals-cyber-mischief/ (-1, , X, X- R/X/L) corp.aol.com/whoweare/history/2006.shtml (-1, , X, X- R/X/L) www.computerworld.com/s/article/9219155/Suspected_Chinese_spear_phishing_attacks_continue_to_hit_Gmail_users (-1, , X, X- R/X/L) web.archive.org/web/20070522231137/http://www.corp.aol.com/whoweare/history/2006.shtml (-1, -1, X, X- R/X/L) arxiv.org/archive/cs.CR (-1, , X, X- R/X/L) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1, , X, X- R/X/L) arxiv.org/abs/1106.4692 (-1, , X, X- R/X/L) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1, , X, X- R/X/L) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1, , X, X- R/X/L) web.archive.org/web/20051103190357/http://www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1, , X, X- R/X/L) www.webcitation.org/61A2zw5D2 (-1, -1, X, X- R/X/L) www.opsi.gov.uk/ACTS/en2006/2006en35.htm (-1, , X, X- R/X/L) informationweek.com/story/showArticle.jhtml?articleID=60404811 (-1, , X, X- R/X/L) simson.net/clips/1995/95.SJMN.AOL_Hackers.html (-1, , X, X- R/X/L) www.webcitation.org/5w9ZIR3zi (-1, -1, X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1, , X, X- R/X/L) www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf (-1, , X, X- R/X/L) www.cybercrime.gov/mantovaniIndict.htm (-1, , X, X- R/X/L) www.microsoft.com/protect/yourself/phishing/engineering.mspx (-1, , X, X- R/X/L) www.eweek.com/article2/0%2C1895%2C1831960%2C00.asp (-1, , X, X- R/X/L) isc.sans.org/diary.php?storyid=1905 (-1, 176, X, X- R/X/L) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html (-1, 469, X, X- R/X/L) www.cnn.com/2003/TECH/internet/07/21/phishing.scam/index.html (-1, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (-1, 469, X, X- R/X/L) www.forbes.com/sites/josephsteinberg/2014/08/25/why-you-are-at-risk-of-phishing-attacks-and-why-jp-morgan-chase-customers-were-targeted-this-week/ (-1, , X, X- R/X/L) books.google.com/books?id=I-9P1EkTkigC&pg=PA433 (-1, -1, X, X- R/X/L) www.safesigner.com (-1, , X, X- R/X/L) pralab.diee.unica.it/sites/default/files/obf.jpg (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  7. 2015-06-09 08:01:57 (UTC): w:sq:User:Muhamedmelly (t - c; 19) to w:sq:Phishing (diff  top?) - Link: www.phishtank.com/what_is_phishing.php (R/Xmeta/L- still there)
    Other links: www.phishtank.com/what_is_phishing.php (19, 70, 2, 1- R/X/L) www.phishtank.com/what_is_phishing.php (19, 70, 2, 1- R/X/L) www.staysafeonline.org/stay-safe-online/keep-a-clean-machine/spam-and-phishing (19, 368, 2, 0- R/X/L) www.staysafeonline.org/stay-safe-online/keep-a-clean-machine/spam-and-phishing (19, 368, 2, 0- R/X/L) www.webopedia.com/TERM/P/phishing.html (19, 3350, X, X- R/X/L) www.webopedia.com/TERM/P/phishing.html (19, 3350, X, X- R/X/L)
  8. 2015-10-06 17:29:11 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Phishing (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishtank.com (R/Xmeta/L- still there)
    Other links: isc.sans.org/diary.php?storyid=1905 (-1, 176, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html (-1, 469, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (-1, 469, X, X- R/X/L) books.google.com/books?id=I-9P1EkTkigC&pg=PA433 (-1, -1, X, X- R/X/L) youtube.com/watch?v=oHg5SJYRHA0 (-1, -1, X, X- R/X/L) www.yourbank.example.com (-1, , X, X- R/X/L) d-nb.info/gnd/7515821-8 (-1, -1, X, X- R/X/L) www.vpnanswers.com/what-are-phishing-attacks-types-and-methods-of-prevention/ (-1, , X, X- R/X/L) www.scamdex.com/Phishing-index.php (-1, , X, X- R/X/L) www.cl.cam.ac.uk/%7Ernc1/takedown.pdf (-1, -1, X, X- R/X/L) www.phishtank.com (-1, 70, X, X- R/X/L) research.microsoft.com/en-us/um/people/cormac/Papers/PhishingAsTragedy.pdf (-1, -1, X, X- R/X/L) www.honeynet.org/papers/phishing/ (-1, 309, X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1, 999999999, X, X- R/X/L) www.utica.edu/academic/institutes/cimip/ (-1, 999999999, X, X- R/X/L) www.AntiPhishing.org (-1, , X, X- R/X/L) www.informationweek.com/story/showArticle.jhtml?articleID=199903450 (-1, , X, X- R/X/L) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1, , X, X- R/X/L) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1, , X, X- R/X/L) www.pcmag.com/article2/0,1895,2085183,00.asp (-1, , X, X- R/X/L) www.earthlink.net/about/press/pr_phishersite/ (-1, , X, X- R/X/L) web.archive.org/web/20070705211932/http://www.earthlink.net/about/press/pr_phishersite/ (-1, -1, X, X- R/X/L) www.washingtonpost.com/wp-dyn/articles/A40578-2005Apr9.html (-1, , X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+HB2471 (-1, , X, X- R/X/L) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1, , X, X- R/X/L) web.archive.org/web/20070131204118/http://media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1, -1, X, X- R/X/L) corp.aol.com/whoweare/history/2006.shtml (-1, , X, X- R/X/L) web.archive.org/web/20070522231137/http://www.corp.aol.com/whoweare/history/2006.shtml (-1, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1, , X, X- R/X/L) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1, , X, X- R/X/L) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1, , X, X- R/X/L) web.archive.org/web/20051103190357/http://www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1, , X, X- R/X/L) www.webcitation.org/61A2zw5D2 (-1, -1, X, X- R/X/L) www.opsi.gov.uk/ACTS/en2006/2006en35.htm (-1, , X, X- R/X/L) informationweek.com/story/showArticle.jhtml?articleID=60404811 (-1, , X, X- R/X/L) www.webcitation.org/5w9ZIR3zi (-1, -1, X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1, , X, X- R/X/L) www.cybercrime.gov/mantovaniIndict.htm (-1, , X, X- R/X/L) www.eweek.com/article2/0%2C1895%2C1831960%2C00.asp (-1, , X, X- R/X/L) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1, , X, X- R/X/L) www.cnn.com/2003/TECH/internet/07/21/phishing.scam/index.html (-1, , X, X- R/X/L) www.forbes.com/sites/josephsteinberg/2014/08/25/why-you-are-at-risk-of-phishing-attacks-and-why-jp-morgan-chase-customers-were-targeted-this-week/ (-1, , X, X- R/X/L) www.safesigner.com (-1, , X, X- R/X/L) consumerscams.org/scam_safety_tips/how_to_report_phishing_scam (-1, , X, X- R/X/L) www.google.com/safebrowsing/report_phish/ (-1, , X, X- R/X/L) www.ftc.gov/phonefraud (-1, , X, X- R/X/L) www.webcitation.org/5w9ZHYbnJ (-1, -1, X, X- R/X/L) www.schneier.com/blog/archives/2006/10/phishtank.html (-1, , X, X- R/X/L) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1, , X, X- R/X/L) www.webcitation.org/5w9ZGndsq (-1, -1, X, X- R/X/L) www.antiphishing.org/solutions.html#takedown (-1, , X, X- R/X/L) reports-archive.adm.cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf (-1, , X, X- R/X/L) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080216101637/http://www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1, -1, X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1568494611002547 (-1, , X, X- R/X/L) www.inf.ufpr.br/lesoliveira/download/ASOC2011.pdf (-1, , X, X- R/X/L) www.confidenttechnologies.com/products/anti-phishing (-1, , X, X- R/X/L) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080406062148/http://people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1, -1, X, X- R/X/L) www.schneier.com/blog/archives/2005/07/security_skins.html (-1, , X, X- R/X/L) www.ovum.com/news/euronews.asp?id=4166 (-1, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=14384 (-1, , X, X- R/X/L) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080406062148/http://www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1, -1, X, X- R/X/L) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/AR2005071302181.html (-1, , X, X- R/X/L) www.webcitation.org/619zhkpkk (-1, -1, X, X- R/X/L) www.bankofamerica.com (-1, , X, X- R/X/L) www.eweek.com/article2/0,1759,1630161,00.asp (-1, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1, , X, X- R/X/L) www.webcitation.org/612DwHoBd (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=99089&WT.svl=news1_1 (-1, , X, X- R/X/L) www.webcitation.org/5w9ZE56Uy (-1, -1, X, X- R/X/L) www.mozilla.org/security/phishing-test.html (-1, , X, X- R/X/L) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1, , X, X- R/X/L) www.3sharp.com/projects/antiphish/index.htm (-1, , X, X- R/X/L) web.archive.org/web/20080114211315/http://www.3sharp.com/projects/antiphish/index.htm (-1, -1, X, X- R/X/L) www.webcitation.org/619zh5NCV (-1, -1, X, X- R/X/L) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (-1, , X, X- R/X/L) www.webcitation.org/619zgMPR6 (-1, -1, X, X- R/X/L) www.mozilla.org/projects/bonecho/anti-phishing/ (-1, , X, X- R/X/L) www.webcitation.org/5mq3wifwd (-1, -1, X, X- R/X/L) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1, , X, X- R/X/L) financialcryptography.com/mt/archives/000645.html (-1, , X, X- R/X/L) financialcryptography.com/mt/archives/000645.html (-1, , X, X- R/X/L) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.HTM (-1, , X, X- R/X/L) www.unik.no/people/josang/papers/JP2005-AusCERT.pdf (-1, , X, X- R/X/L) www.pcworld.com/article/125739-1/article.html (-1, , X, X- R/X/L) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (-1, , X, X- R/X/L) www.zdnetindia.com/news/features/stories/126569.html (-1, , X, X- R/X/L) www.webcitation.org/5w9ZCK7Pk (-1, -1, X, X- R/X/L) www2006.org/programme/item.php?id=3533 (-1, , X, X- R/X/L) isc.incidents.org/diary.php?storyid=1194 (-1, , X, X- R/X/L) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (-1, , X, X- R/X/L) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (-1, , X, X- R/X/L) web.archive.org/web/20070306 (-1, -1, X, X- R/X/L) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (-1, , X, X- R/X/L) www.hexview.com/sdp/node/24 (-1, , X, X- R/X/L) web.archive.org/web/20080320035409/http://www.hexview.com/sdp/node/24 (-1, -1, X, X- R/X/L) www.comodo.com/resources/home/phishing-scams.php (-1, , X, X- R/X/L) online.wsj.com/public/article/0,,SB112424042313615131-z_8jLB2WkfcVtgdAWf6LRh733sg_20060817,00.html?mod=blogs (-1, , X, X- R/X/L) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1, , X, X- R/X/L) www.whichssl.com/antiphishing.html (-1, , X, X- R/X/L) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1, , X, X- R/X/L) web.archive.org/web/20081028225500/http://www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1, -1, X, X- R/X/L) applications.boi.com/updates/Article?PR_ID=1430 (-1, , X, X- R/X/L) web.archive.org/web/20081007194413/http://applications.boi.com/updates/Article?PR_ID=1430 (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1, , X, X- R/X/L) news.biharprabha.com/2014/02/20-indians-are-victims-of-online-phishing-attacks-microsoft/ (-1, , X, X- R/X/L) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=15013 (-1, , X, X- R/X/L) research.microsoft.com/~cormac/Papers/PhishingAsTragedy.pdf (-1, -1, X, X- R/X/L) www.gartner.com/it/page.jsp?id=565125 (-1, , X, X- R/X/L) www.csoonline.com/talkback/071905.html (-1, , X, X- R/X/L) web.archive.org/web/20080324080028/http://www.csoonline.com/talkback/071905.html (-1, -1, X, X- R/X/L) www.met.police.uk/fraudalert/docs/internet_bank_fraud.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ndG8erWg (-1, -1, X, X- R/X/L) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1, , X, X- R/X/L) web.archive.org/web/20050324073507/http://www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1, -1, X, X- R/X/L) www.techweb.com/wire/security/186701001 (-1, , X, X- R/X/L) www.symantec.com/connect/blogs/covert-redirect-flaw-oauth-not-next-heartbleed (-1, , X, X- R/X/L) www.scmagazine.com/covert-redirect-vulnerability-impacts-oauth-20-openid/article/345407/ (-1, , X, X- R/X/L) news.yahoo.com/facebook-google-users-threatened-security-192547549.html (-1, , X, X- R/X/L) thehackernews.com/2014/05/nasty-covert-redirect-vulnerability.html (-1, , X, X- R/X/L) www.foxnews.com/tech/2014/05/05/facebook-google-users-threatened-by-new-security-flaw/ (-1, , X, X- R/X/L) www.tomsguide.com/us/facebook-google-covert-redirect-flaw,news-18726.html (-1, , X, X- R/X/L) tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html (-1, , X, X- R/X/L) www.cnet.com/news/serious-security-flaw-in-oauth-and-openid-discovered/ (-1, , X, X- R/X/L) www.webcitation.org/5w9Z7NfVB (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1, , X, X- R/X/L) www.eweek.com/article2/0,1895,2082039,00.asp (-1, , X, X- R/X/L) www.webcitation.org/5w9Z5zOVh (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1, , X, X- R/X/L) www.webcitation.org/5w9Z4mv7k (-1, -1, X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/technology/3608943.stm (-1, , X, X- R/X/L) www.webcitation.org/5w9Z2iACi (-1, -1, X, X- R/X/L) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1, , X, X- R/X/L) www.powershow.com/view1/1f004e-NzY0N/The_use_of_Optical_Character_Recognition_OCR_software_in_spam_filtering_powerpoint_ppt_presentation (-1, , X, X- R/X/L) www.webcitation.org/5w9YzPsN0 (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1, , X, X- R/X/L) www.thoughtcrime.org/software/sslstrip/. (-1, , X, X- R/X/L) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1, , X, X- R/X/L) q.queso.com/archives/001617 (-1, , X, X- R/X/L) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1, , X, X- R/X/L) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (-1, , X, X- R/X/L) www.shmoo.com/idn/homograph.txt (-1, , X, X- R/X/L) www.hsbcusa.com/security/recognize_fraud.html (-1, , X, X- R/X/L) www.webcitation.org/6XMoiQ5E9 (-1, -1, X, X- R/X/L) netforbeginners.about.com/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (-1, , X, X- R/X/L) www.webcitation.org/5w9YcgvUb (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1, , X, X- R/X/L) www.firmex.com/blog/spear-phishing-whos-getting-caught/ (-1, , X, X- R/X/L) www.microsoft.com/canada/athome/security/email/spear_phishing.mspx (-1, , X, X- R/X/L) www.emailanswers.com/2013/10/phishing-emails-unacceptable-failures-american-express/ (-1, , X, X- R/X/L) www.bbc.com/news/technology-25506020 (-1, , X, X- R/X/L) www.youtube.com/watch?v=fzXclG_c5Sk (-1, -1, X, X- R/X/L) www.fraudwatchinternational.com (-1, , X, X- R/X/L) www.webcitation.org/5QVOm5OO1 (-1, -1, X, X- R/X/L) www.millersmiles.co.uk (-1, , X, X- R/X/L) apwg.org/reports/apwg_report_Q3_2009.pdf (-1, 999999999, X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (-1, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (-1, , X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (-1, , X, X- R/X/L) www.webcitation.org/5gY2R1j1g (-1, -1, X, X- R/X/L) rapidshare.de/en/phishing.html (-1, , X, X- R/X/L) web.archive.org/web/20080430101024/http://rapidshare.de/en/phishing.html (-1, -1, X, X- R/X/L) dx.doi.org/10.1145/1290958.1290968 (-1, , X, X- R/X/L) www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (-1, , X, X- R/X/L) web.archive.org/web/20061205104430/http://www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (-1, -1, X, X- R/X/L) www.pcworld.com/resource/article/0,aid,125956,pg,1,RSS,RSS,00.asp (-1, , X, X- R/X/L) www.browser-recon.info (-1, , X, X- R/X/L) www.webcitation.org/5w9YXj9AJ (-1, -1, X, X- R/X/L) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1, , X, X- R/X/L) www.icann.org/news/announcement-2-2014-12-16-en (-1, , X, X- R/X/L) www.prweb.com/releases/2014-Retailer-Hacks/Phishing-data-breach/prweb12167251.htm (-1, , X, X- R/X/L) krebsonsecurity.com/2014/09/data-nearly-all-u-s-home-depot-stores-hit/ (-1, , X, X- R/X/L) www.nytimes.com/2011/05/28/business/28hack.html (-1, , X, X- R/X/L) blogs.rsa.com/anatomy-of-an-attack/ (-1, , X, X- R/X/L) 247wallst.com/retail/2014/05/05/target-ceo-sacked/ (-1, , X, X- R/X/L) bringmethenews.com/2014/02/12/report-email-phishing-scam-led-to-target-breach/ (-1, , X, X- R/X/L) firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1272/1192 (-1, , X, X- R/X/L) www.webcitation.org/5w9YVyMYn (-1, -1, X, X- R/X/L) itmanagement.earthweb.com/secu/article.php/3451501 (-1, , X, X- R/X/L) financialcryptography.com/mt/archives/000609.html (-1, , X, X- R/X/L) www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?page=all (-1, , X, X- R/X/L) www.webcitation.org/5w9YV2fuL (-1, -1, X, X- R/X/L) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1, , X, X- R/X/L) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1, , X, X- R/X/L) www.wordspy.com/words/phishing.asp (-1, , X, X- R/X/L) www.dodbuzz.com/2011/08/22/report-chinese-tv-doc-reveals-cyber-mischief/ (-1, , X, X- R/X/L) www.computerworld.com/s/article/9219155/Suspected_Chinese_spear_phishing_attacks_continue_to_hit_Gmail_users (-1, , X, X- R/X/L) www.antiphishing.org/resources/apwg-reports/ (-1, , X, X- R/X/L) simson.net/clips/1995/95.SJMN.AOL_Hackers.html (-1, , X, X- R/X/L) www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf (-1, , X, X- R/X/L) www.microsoft.com/protect/yourself/phishing/engineering.mspx (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  9. 2015-11-04 01:46:42 (UTC): User Epicgenius t • c • dc • l • ef • b • bl; (274671) to User:Epicgenius/sandbox (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishtank.com (R/Xmeta/L- removed)
    Other links: reftag.appspot.com (274671, 999999999, X, X- R/X/L) edwardbetts.com/find_link (274671, -1, X, X- R/X/L) www.ascii.cl/htmlcodes.htm (274671, 999999999, X, X- R/X/L) www.javascriptkit.com/script/script2/charcount.shtml (274671, -1, X, X- R/X/L) dispenser.homenet.org/~dispenser/cgi-bin/reflinks.py?page= (274671, -1, X, X- R/X/L) dispenser.homenet.org/~dispenser/cgi-bin/rdcheck.py?page= (274671, -1, X, X- R/X/L) dispenser.homenet.org/~dispenser/view/Peer_reviewer#page: (274671, -1, X, X- R/X/L) dispenser.homenet.org/~dispenser/cgi-bin/webchecklinks.py?page= (274671, -1, X, X- R/X/L) dispenser.homenet.org/~dispenser/cgi-bin/dablinks.py?page= (274671, -1, X, X- R/X/L) dispenser.homenet.org/~dispenser/cgi-bin/altviewer.py?page= (274671, -1, X, X- R/X/L) snook.ca/technical/colour_contrast/colour.html#fg=33FF33,bg=333333 (274671, 999999999, X, X- R/X/L) www.color-blindness.com/color-name-hue/ (274671, 999999999, X, X- R/X/L) www.mywot.com (274671, 431, X, X- R/X/L) www.phishtank.com (274671, 70, X, X- R/X/L)

    User is in trusted groups rollbacker, reviewer on some wikis
  10. 2016-01-12 04:21:35 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Phishing (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishtank.com (R/Xmeta/L- still there)
    Other links: www.webcitation.org/5w9ZGndsq (-1, -1, X, X- R/X/L) www.antiphishing.org/solutions.html#takedown (-1, , X, X- R/X/L) reports-archive.adm.cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf (-1, , X, X- R/X/L) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080216101637/http://www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1, -1, X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1568494611002547 (-1, , X, X- R/X/L) www.inf.ufpr.br/lesoliveira/download/ASOC2011.pdf (-1, , X, X- R/X/L) www.confidenttechnologies.com/products/anti-phishing (-1, , X, X- R/X/L) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080406062148/http://people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1, -1, X, X- R/X/L) www.schneier.com/blog/archives/2005/07/security_skins.html (-1, , X, X- R/X/L) www.ovum.com/news/euronews.asp?id=4166 (-1, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=14384 (-1, , X, X- R/X/L) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080406062148/http://www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1, -1, X, X- R/X/L) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/AR2005071302181.html (-1, , X, X- R/X/L) www.webcitation.org/619zhkpkk (-1, -1, X, X- R/X/L) www.bankofamerica.com (-1, , X, X- R/X/L) www.eweek.com/article2/0,1759,1630161,00.asp (-1, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1, , X, X- R/X/L) www.webcitation.org/612DwHoBd (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=99089&WT.svl=news1_1 (-1, , X, X- R/X/L) www.webcitation.org/5w9ZE56Uy (-1, -1, X, X- R/X/L) www.mozilla.org/security/phishing-test.html (-1, , X, X- R/X/L) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1, , X, X- R/X/L) www.3sharp.com/projects/antiphish/index.htm (-1, , X, X- R/X/L) web.archive.org/web/20080114211315/http://www.3sharp.com/projects/antiphish/index.htm (-1, -1, X, X- R/X/L) www.webcitation.org/619zh5NCV (-1, -1, X, X- R/X/L) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (-1, , X, X- R/X/L) www.webcitation.org/619zgMPR6 (-1, -1, X, X- R/X/L) www.mozilla.org/projects/bonecho/anti-phishing/ (-1, , X, X- R/X/L) www.webcitation.org/5mq3wifwd (-1, -1, X, X- R/X/L) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1, , X, X- R/X/L) financialcryptography.com/mt/archives/000645.html (-1, , X, X- R/X/L) financialcryptography.com/mt/archives/000645.html (-1, , X, X- R/X/L) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.HTM (-1, , X, X- R/X/L) www.unik.no/people/josang/papers/JP2005-AusCERT.pdf (-1, , X, X- R/X/L) www.pcworld.com/article/125739-1/article.html (-1, , X, X- R/X/L) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (-1, , X, X- R/X/L) www.zdnetindia.com/news/features/stories/126569.html (-1, , X, X- R/X/L) www.webcitation.org/5w9ZCK7Pk (-1, -1, X, X- R/X/L) www2006.org/programme/item.php?id=3533 (-1, , X, X- R/X/L) isc.incidents.org/diary.php?storyid=1194 (-1, , X, X- R/X/L) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (-1, , X, X- R/X/L) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (-1, , X, X- R/X/L) web.archive.org/web/20070306 (-1, -1, X, X- R/X/L) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (-1, , X, X- R/X/L) www.hexview.com/sdp/node/24 (-1, , X, X- R/X/L) web.archive.org/web/20080320035409/http://www.hexview.com/sdp/node/24 (-1, -1, X, X- R/X/L) www.comodo.com/resources/home/phishing-scams.php (-1, , X, X- R/X/L) online.wsj.com/public/article/0,,SB112424042313615131-z_8jLB2WkfcVtgdAWf6LRh733sg_20060817,00.html?mod=blogs (-1, , X, X- R/X/L) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1, , X, X- R/X/L) www.whichssl.com/antiphishing.html (-1, , X, X- R/X/L) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1, , X, X- R/X/L) web.archive.org/web/20081028225500/http://www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1, -1, X, X- R/X/L) applications.boi.com/updates/Article?PR_ID=1430 (-1, , X, X- R/X/L) web.archive.org/web/20081007194413/http://applications.boi.com/updates/Article?PR_ID=1430 (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1, , X, X- R/X/L) news.biharprabha.com/2014/02/20-indians-are-victims-of-online-phishing-attacks-microsoft/ (-1, , X, X- R/X/L) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=15013 (-1, , X, X- R/X/L) research.microsoft.com/~cormac/Papers/PhishingAsTragedy.pdf (-1, -1, X, X- R/X/L) www.gartner.com/it/page.jsp?id=565125 (-1, , X, X- R/X/L) www.csoonline.com/talkback/071905.html (-1, , X, X- R/X/L) web.archive.org/web/20080324080028/http://www.csoonline.com/talkback/071905.html (-1, -1, X, X- R/X/L) www.met.police.uk/fraudalert/docs/internet_bank_fraud.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ndG8erWg (-1, -1, X, X- R/X/L) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1, , X, X- R/X/L) web.archive.org/web/20050324073507/http://www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1, -1, X, X- R/X/L) www.techweb.com/wire/security/186701001 (-1, , X, X- R/X/L) www.symantec.com/connect/blogs/covert-redirect-flaw-oauth-not-next-heartbleed (-1, , X, X- R/X/L) www.scmagazine.com/covert-redirect-vulnerability-impacts-oauth-20-openid/article/345407/ (-1, , X, X- R/X/L) news.yahoo.com/facebook-google-users-threatened-security-192547549.html (-1, , X, X- R/X/L) thehackernews.com/2014/05/nasty-covert-redirect-vulnerability.html (-1, , X, X- R/X/L) www.foxnews.com/tech/2014/05/05/facebook-google-users-threatened-by-new-security-flaw/ (-1, , X, X- R/X/L) www.tomsguide.com/us/facebook-google-covert-redirect-flaw,news-18726.html (-1, , X, X- R/X/L) tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html (-1, , X, X- R/X/L) www.cnet.com/news/serious-security-flaw-in-oauth-and-openid-discovered/ (-1, , X, X- R/X/L) www.webcitation.org/5w9Z7NfVB (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1, , X, X- R/X/L) www.eweek.com/article2/0,1895,2082039,00.asp (-1, , X, X- R/X/L) www.webcitation.org/5w9Z5zOVh (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1, , X, X- R/X/L) www.webcitation.org/5w9Z4mv7k (-1, -1, X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/technology/3608943.stm (-1, , X, X- R/X/L) www.webcitation.org/5w9Z2iACi (-1, -1, X, X- R/X/L) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1, , X, X- R/X/L) www.powershow.com/view1/1f004e-NzY0N/The_use_of_Optical_Character_Recognition_OCR_software_in_spam_filtering_powerpoint_ppt_presentation (-1, , X, X- R/X/L) www.webcitation.org/5w9YzPsN0 (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1, , X, X- R/X/L) www.thoughtcrime.org/software/sslstrip/. (-1, , X, X- R/X/L) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1, , X, X- R/X/L) q.queso.com/archives/001617 (-1, , X, X- R/X/L) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1, , X, X- R/X/L) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (-1, , X, X- R/X/L) www.shmoo.com/idn/homograph.txt (-1, , X, X- R/X/L) www.hsbcusa.com/security/recognize_fraud.html (-1, , X, X- R/X/L) www.webcitation.org/6XMoiQ5E9 (-1, -1, X, X- R/X/L) netforbeginners.about.com/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (-1, , X, X- R/X/L) www.webcitation.org/5w9YcgvUb (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1, , X, X- R/X/L) www.firmex.com/blog/spear-phishing-whos-getting-caught/ (-1, , X, X- R/X/L) www.microsoft.com/canada/athome/security/email/spear_phishing.mspx (-1, , X, X- R/X/L) www.emailanswers.com/2013/10/phishing-emails-unacceptable-failures-american-express/ (-1, , X, X- R/X/L) www.bbc.com/news/technology-25506020 (-1, , X, X- R/X/L) www.youtube.com/watch?v=fzXclG_c5Sk (-1, -1, X, X- R/X/L) www.fraudwatchinternational.com (-1, , X, X- R/X/L) www.webcitation.org/5QVOm5OO1 (-1, -1, X, X- R/X/L) www.millersmiles.co.uk (-1, , X, X- R/X/L) apwg.org/reports/apwg_report_Q3_2009.pdf (-1, 999999999, X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (-1, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (-1, , X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (-1, , X, X- R/X/L) www.webcitation.org/5gY2R1j1g (-1, -1, X, X- R/X/L) rapidshare.de/en/phishing.html (-1, , X, X- R/X/L) web.archive.org/web/20080430101024/http://rapidshare.de/en/phishing.html (-1, -1, X, X- R/X/L) dx.doi.org/10.1145/1290958.1290968 (-1, , X, X- R/X/L) www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (-1, , X, X- R/X/L) web.archive.org/web/20061205104430/http://www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (-1, -1, X, X- R/X/L) www.pcworld.com/resource/article/0,aid,125956,pg,1,RSS,RSS,00.asp (-1, , X, X- R/X/L) www.browser-recon.info (-1, , X, X- R/X/L) www.webcitation.org/5w9YXj9AJ (-1, -1, X, X- R/X/L) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1, , X, X- R/X/L) www.icann.org/news/announcement-2-2014-12-16-en (-1, , X, X- R/X/L) www.prweb.com/releases/2014-Retailer-Hacks/Phishing-data-breach/prweb12167251.htm (-1, , X, X- R/X/L) krebsonsecurity.com/2014/09/data-nearly-all-u-s-home-depot-stores-hit/ (-1, , X, X- R/X/L) www.nytimes.com/2011/05/28/business/28hack.html (-1, , X, X- R/X/L) blogs.rsa.com/anatomy-of-an-attack/ (-1, , X, X- R/X/L) 247wallst.com/retail/2014/05/05/target-ceo-sacked/ (-1, , X, X- R/X/L) bringmethenews.com/2014/02/12/report-email-phishing-scam-led-to-target-breach/ (-1, , X, X- R/X/L) www.dodbuzz.com/2011/08/22/report-chinese-tv-doc-reveals-cyber-mischief/ (-1, , X, X- R/X/L) www.computerworld.com/s/article/9219155/Suspected_Chinese_spear_phishing_attacks_continue_to_hit_Gmail_users (-1, , X, X- R/X/L) firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1272/1192 (-1, , X, X- R/X/L) www.webcitation.org/5w9YVyMYn (-1, -1, X, X- R/X/L) itmanagement.earthweb.com/secu/article.php/3451501 (-1, , X, X- R/X/L) financialcryptography.com/mt/archives/000609.html (-1, , X, X- R/X/L) www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?page=all (-1, , X, X- R/X/L) www.webcitation.org/5w9YV2fuL (-1, -1, X, X- R/X/L) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1, , X, X- R/X/L) www.phishing.org/history-of-phishing/ (-1, , X, X- R/X/L) www.phishing.org/history-of-phishing/ (-1, , X, X- R/X/L) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1, , X, X- R/X/L) www.wordspy.com/words/phishing.asp (-1, , X, X- R/X/L) www.antiphishing.org/resources/apwg-reports/ (-1, , X, X- R/X/L) simson.net/clips/1995/95.SJMN.AOL_Hackers.html (-1, , X, X- R/X/L) www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf (-1, , X, X- R/X/L) isc.sans.org/diary.php?storyid=1905 (-1, 176, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html (-1, 469, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (-1, 469, X, X- R/X/L) books.google.com/books?id=I-9P1EkTkigC&pg=PA433 (-1, -1, X, X- R/X/L) www.yourbank.example.com (-1, , X, X- R/X/L) d-nb.info/gnd/7515821-8 (-1, -1, X, X- R/X/L) www.plixer.com/phishing-attack-education/click-click-phish.html (-1, , X, X- R/X/L) www.vpnanswers.com/what-are-phishing-attacks-types-and-methods-of-prevention/ (-1, , X, X- R/X/L) www.scamdex.com/Phishing-index.php (-1, , X, X- R/X/L) www.cl.cam.ac.uk/%7Ernc1/takedown.pdf (-1, -1, X, X- R/X/L) www.phishtank.com (-1, 70, X, X- R/X/L) www.phishkiller.com (-1, , X, X- R/X/L) research.microsoft.com/en-us/um/people/cormac/Papers/PhishingAsTragedy.pdf (-1, -1, X, X- R/X/L) www.honeynet.org/papers/phishing/ (-1, 309, X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1, 999999999, X, X- R/X/L) www.utica.edu/academic/institutes/cimip/ (-1, 999999999, X, X- R/X/L) www.AntiPhishing.org (-1, , X, X- R/X/L) www.informationweek.com/story/showArticle.jhtml?articleID=199903450 (-1, , X, X- R/X/L) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1, , X, X- R/X/L) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1, , X, X- R/X/L) www.pcmag.com/article2/0,1895,2085183,00.asp (-1, , X, X- R/X/L) www.earthlink.net/about/press/pr_phishersite/ (-1, , X, X- R/X/L) web.archive.org/web/20070705211932/http://www.earthlink.net/about/press/pr_phishersite/ (-1, -1, X, X- R/X/L) www.washingtonpost.com/wp-dyn/articles/A40578-2005Apr9.html (-1, , X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+HB2471 (-1, , X, X- R/X/L) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1, , X, X- R/X/L) web.archive.org/web/20070131204118/http://media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1, -1, X, X- R/X/L) corp.aol.com/whoweare/history/2006.shtml (-1, , X, X- R/X/L) web.archive.org/web/20070522231137/http://www.corp.aol.com/whoweare/history/2006.shtml (-1, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1, , X, X- R/X/L) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1, , X, X- R/X/L) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1, , X, X- R/X/L) web.archive.org/web/20051103190357/http://www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1, , X, X- R/X/L) www.webcitation.org/61A2zw5D2 (-1, -1, X, X- R/X/L) www.opsi.gov.uk/ACTS/en2006/2006en35.htm (-1, , X, X- R/X/L) informationweek.com/story/showArticle.jhtml?articleID=60404811 (-1, , X, X- R/X/L) www.webcitation.org/5w9ZIR3zi (-1, -1, X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1, , X, X- R/X/L) www.justice.gov/archive/opa/pr/2004/October/04_crm_726.htm (-1, , X, X- R/X/L) www.eweek.com/article2/0%2C1895%2C1831960%2C00.asp (-1, , X, X- R/X/L) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1, , X, X- R/X/L) www.cnn.com/2003/TECH/internet/07/21/phishing.scam/index.html (-1, , X, X- R/X/L) www.forbes.com/sites/josephsteinberg/2014/08/25/why-you-are-at-risk-of-phishing-attacks-and-why-jp-morgan-chase-customers-were-targeted-this-week/ (-1, , X, X- R/X/L) www.safesigner.com (-1, , X, X- R/X/L) consumerscams.org/scam_safety_tips/how_to_report_phishing_scam (-1, , X, X- R/X/L) www.google.com/safebrowsing/report_phish/ (-1, , X, X- R/X/L) www.ftc.gov/phonefraud (-1, , X, X- R/X/L) www.webcitation.org/5w9ZHYbnJ (-1, -1, X, X- R/X/L) www.schneier.com/blog/archives/2006/10/phishtank.html (-1, , X, X- R/X/L) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  11. 2016-01-21 07:10:35 (UTC): wikidata:www:User:GZWDer (flood) (t - c; 1761986) to wikidata:www:Q1028201 (diff  !top) - Link: www.phishtank.com (R/Xmeta/L- removed)
    Other links: www.phishtank.com (1761986, 70, X, X- R/X/L) www.phishtank.com (1761986, 70, X, X- R/X/L)

    User is in a trusted group bot on some wikis
  12. 2016-04-05 16:37:47 (UTC): User Harry- t • c • dc • l • ef • b • bl; (1563) to Phishing (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishtank.com (R/Xmeta/L- still there)
    Other links: www.foxnews.com/tech/2014/05/05/facebook-google-users-threatened-by-new-security-flaw/ (1563, , X, X- R/X/L) www.tomsguide.com/us/facebook-google-covert-redirect-flaw,news-18726.html (1563, , X, X- R/X/L) tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html (1563, , X, X- R/X/L) www.cnet.com/news/serious-security-flaw-in-oauth-and-openid-discovered/ (1563, , X, X- R/X/L) www.webcitation.org/5w9Z7NfVB (1563, -1, X, X- R/X/L) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (1563, , X, X- R/X/L) www.eweek.com/article2/0,1895,2082039,00.asp (1563, , X, X- R/X/L) www.webcitation.org/5w9Z5zOVh (1563, -1, X, X- R/X/L) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (1563, , X, X- R/X/L) www.webcitation.org/5w9Z4mv7k (1563, -1, X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (1563, , X, X- R/X/L) news.bbc.co.uk/1/hi/technology/3608943.stm (1563, , X, X- R/X/L) www.webcitation.org/5w9Z2iACi (1563, -1, X, X- R/X/L) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (1563, , X, X- R/X/L) www.powershow.com/view1/1f004e-NzY0N/The_use_of_Optical_Character_Recognition_OCR_software_in_spam_filtering_powerpoint_ppt_presentation (1563, , X, X- R/X/L) d-nb.info/gnd/7515821-8 (1563, -1, X, X- R/X/L) www.plixer.com/phishing-attack-education/click-click-phish.html (1563, , X, X- R/X/L) www.vpnanswers.com/what-are-phishing-attacks-types-and-methods-of-prevention/ (1563, , X, X- R/X/L) www.scamdex.com/Phishing-index.php (1563, , X, X- R/X/L) www.cl.cam.ac.uk/%7Ernc1/takedown.pdf (1563, -1, X, X- R/X/L) www.phishtank.com (1563, 70, X, X- R/X/L) www.phishkiller.com (1563, , X, X- R/X/L) research.microsoft.com/en-us/um/people/cormac/Papers/PhishingAsTragedy.pdf (1563, -1, X, X- R/X/L) www.webcitation.org/5w9YzPsN0 (1563, -1, X, X- R/X/L) www.honeynet.org/papers/phishing/ (1563, 309, X, X- R/X/L) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (1563, , X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (1563, 999999999, X, X- R/X/L) www.thoughtcrime.org/software/sslstrip/. (1563, , X, X- R/X/L) www.utica.edu/academic/institutes/cimip/ (1563, 999999999, X, X- R/X/L) www.theregister.co.uk/2007/12/12/phishing_redirection/ (1563, , X, X- R/X/L) www.AntiPhishing.org (1563, , X, X- R/X/L) q.queso.com/archives/001617 (1563, , X, X- R/X/L) www.informationweek.com/story/showArticle.jhtml?articleID=199903450 (1563, , X, X- R/X/L) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (1563, , X, X- R/X/L) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (1563, , X, X- R/X/L) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (1563, , X, X- R/X/L) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (1563, , X, X- R/X/L) www.shmoo.com/idn/homograph.txt (1563, , X, X- R/X/L) www.pcmag.com/article2/0,1895,2085183,00.asp (1563, , X, X- R/X/L) www.hsbcusa.com/security/recognize_fraud.html (1563, , X, X- R/X/L) www.earthlink.net/about/press/pr_phishersite/ (1563, , X, X- R/X/L) www.webcitation.org/6XMoiQ5E9 (1563, -1, X, X- R/X/L) web.archive.org/web/20070705211932/http://www.earthlink.net/about/press/pr_phishersite/ (1563, -1, X, X- R/X/L) netforbeginners.about.com/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (1563, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/articles/A40578-2005Apr9.html (1563, , X, X- R/X/L) www.webcitation.org/5w9YcgvUb (1563, -1, X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+HB2471 (1563, , X, X- R/X/L) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (1563, , X, X- R/X/L) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (1563, , X, X- R/X/L) www.firmex.com/blog/spear-phishing-whos-getting-caught/ (1563, , X, X- R/X/L) web.archive.org/web/20070131204118/http://media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (1563, -1, X, X- R/X/L) www.microsoft.com/canada/athome/security/email/spear_phishing.mspx (1563, , X, X- R/X/L) corp.aol.com/whoweare/history/2006.shtml (1563, , X, X- R/X/L) www.emailanswers.com/2013/10/phishing-emails-unacceptable-failures-american-express/ (1563, , X, X- R/X/L) web.archive.org/web/20070522231137/http://www.corp.aol.com/whoweare/history/2006.shtml (1563, -1, X, X- R/X/L) www.bbc.com/news/technology-25506020 (1563, , X, X- R/X/L) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (1563, , X, X- R/X/L) www.youtube.com/watch?v=fzXclG_c5Sk (1563, -1, X, X- R/X/L) www.fraudwatchinternational.com (1563, , X, X- R/X/L) www.webcitation.org/5QVOm5OO1 (1563, -1, X, X- R/X/L) www.millersmiles.co.uk (1563, , X, X- R/X/L) apwg.org/reports/apwg_report_Q3_2009.pdf (1563, 999999999, X, X- R/X/L) news.zdnet.co.uk/0,39020330,39258528,00.htm (1563, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (1563, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (1563, , X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (1563, , X, X- R/X/L) www.webcitation.org/5gY2R1j1g (1563, -1, X, X- R/X/L) rapidshare.de/en/phishing.html (1563, , X, X- R/X/L) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (1563, , X, X- R/X/L) web.archive.org/web/20080430101024/http://rapidshare.de/en/phishing.html (1563, -1, X, X- R/X/L) dx.doi.org/10.1145/1290958.1290968 (1563, , X, X- R/X/L) web.archive.org/web/20051103190357/http://www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (1563, -1, X, X- R/X/L) www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (1563, , X, X- R/X/L) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (1563, , X, X- R/X/L) web.archive.org/web/20061205104430/http://www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (1563, -1, X, X- R/X/L) www.pcworld.com/resource/article/0,aid,125956,pg,1,RSS,RSS,00.asp (1563, , X, X- R/X/L) www.webcitation.org/61A2zw5D2 (1563, -1, X, X- R/X/L) www.browser-recon.info (1563, , X, X- R/X/L) www.webcitation.org/5w9YXj9AJ (1563, -1, X, X- R/X/L) www.opsi.gov.uk/ACTS/en2006/2006en35.htm (1563, , X, X- R/X/L) www.irs.gov/newsroom/article/0,,id=155682,00.html (1563, , X, X- R/X/L) www.icann.org/news/announcement-2-2014-12-16-en (1563, , X, X- R/X/L) www.usatoday.com/story/money/business/2014/11/06/home-depot-hackers-stolen-data/18613167/ (1563, , X, X- R/X/L) www.nytimes.com/2011/05/28/business/28hack.html (1563, , X, X- R/X/L) blogs.rsa.com/anatomy-of-an-attack/ (1563, , X, X- R/X/L) 247wallst.com/retail/2014/05/05/target-ceo-sacked/ (1563, , X, X- R/X/L) informationweek.com/story/showArticle.jhtml?articleID=60404811 (1563, , X, X- R/X/L) bringmethenews.com/2014/02/12/report-email-phishing-scam-led-to-target-breach/ (1563, , X, X- R/X/L) www.webcitation.org/5w9ZIR3zi (1563, -1, X, X- R/X/L) www.dodbuzz.com/2011/08/22/report-chinese-tv-doc-reveals-cyber-mischief/ (1563, , X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (1563, , X, X- R/X/L) www.computerworld.com/s/article/9219155/Suspected_Chinese_spear_phishing_attacks_continue_to_hit_Gmail_users (1563, , X, X- R/X/L) www.justice.gov/archive/opa/pr/2004/October/04_crm_726.htm (1563, , X, X- R/X/L) firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1272/1192 (1563, , X, X- R/X/L) www.eweek.com/article2/0%2C1895%2C1831960%2C00.asp (1563, , X, X- R/X/L) www.webcitation.org/5w9YVyMYn (1563, -1, X, X- R/X/L) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (1563, , X, X- R/X/L) itmanagement.earthweb.com/secu/article.php/3451501 (1563, , X, X- R/X/L) www.cnn.com/2003/TECH/internet/07/21/phishing.scam/index.html (1563, , X, X- R/X/L) financialcryptography.com/mt/archives/000609.html (1563, , X, X- R/X/L) www.forbes.com/sites/josephsteinberg/2014/08/25/why-you-are-at-risk-of-phishing-attacks-and-why-jp-morgan-chase-customers-were-targeted-this-week/ (1563, , X, X- R/X/L) www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?page=all (1563, , X, X- R/X/L) www.webcitation.org/5w9YV2fuL (1563, -1, X, X- R/X/L) www.rajuabju.com/warezirc/historyofaolwarez.htm (1563, , X, X- R/X/L) www.phishing.org/history-of-phishing/ (1563, , X, X- R/X/L) www.phishing.org/history-of-phishing/ (1563, , X, X- R/X/L) wired-vig.wired.com/news/technology/0,1282,9932,00.html (1563, , X, X- R/X/L) www.wordspy.com/words/phishing.asp (1563, , X, X- R/X/L) www.antiphishing.org/resources/apwg-reports/ (1563, , X, X- R/X/L) simson.net/clips/1995/95.SJMN.AOL_Hackers.html (1563, , X, X- R/X/L) www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf (1563, , X, X- R/X/L) www.safesigner.com (1563, , X, X- R/X/L) isc.sans.org/diary.php?storyid=1905 (1563, 176, X, X- R/X/L) consumerscams.org/scam_safety_tips/how_to_report_phishing_scam (1563, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html (1563, 469, X, X- R/X/L) www.google.com/safebrowsing/report_phish/ (1563, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (1563, 469, X, X- R/X/L) www.ftc.gov/phonefraud (1563, , X, X- R/X/L) books.google.com/books?id=I-9P1EkTkigC&pg=PA433 (1563, -1, X, X- R/X/L) www.webcitation.org/5w9ZHYbnJ (1563, -1, X, X- R/X/L) www.yourbank.example.com (1563, , X, X- R/X/L) www.schneier.com/blog/archives/2006/10/phishtank.html (1563, , X, X- R/X/L) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (1563, , X, X- R/X/L) www.webcitation.org/5w9ZGndsq (1563, -1, X, X- R/X/L) www.antiphishing.org/solutions.html#takedown (1563, , X, X- R/X/L) reports-archive.adm.cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf (1563, , X, X- R/X/L) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (1563, , X, X- R/X/L) web.archive.org/web/20080216101637/http://www.albany.edu/iasymposium/2006/chandrasekaran.pdf (1563, -1, X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1568494611002547 (1563, , X, X- R/X/L) www.inf.ufpr.br/lesoliveira/download/ASOC2011.pdf (1563, , X, X- R/X/L) www.confidenttechnologies.com/products/anti-phishing (1563, , X, X- R/X/L) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (1563, , X, X- R/X/L) web.archive.org/web/20080406062148/http://people.deas.harvard.edu/~rachna/papers/securityskins.pdf (1563, -1, X, X- R/X/L) www.schneier.com/blog/archives/2005/07/security_skins.html (1563, , X, X- R/X/L) www.ovum.com/news/euronews.asp?id=4166 (1563, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (1563, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=14384 (1563, , X, X- R/X/L) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (1563, , X, X- R/X/L) web.archive.org/web/20080406062148/http://www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (1563, -1, X, X- R/X/L) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (1563, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/AR2005071302181.html (1563, , X, X- R/X/L) www.webcitation.org/619zhkpkk (1563, -1, X, X- R/X/L) www.bankofamerica.com (1563, , X, X- R/X/L) www.eweek.com/article2/0,1759,1630161,00.asp (1563, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (1563, , X, X- R/X/L) www.webcitation.org/612DwHoBd (1563, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=99089&WT.svl=news1_1 (1563, , X, X- R/X/L) www.webcitation.org/5w9ZE56Uy (1563, -1, X, X- R/X/L) www.mozilla.org/security/phishing-test.html (1563, , X, X- R/X/L) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (1563, , X, X- R/X/L) www.3sharp.com/projects/antiphish/index.htm (1563, , X, X- R/X/L) web.archive.org/web/20080114211315/http://www.3sharp.com/projects/antiphish/index.htm (1563, -1, X, X- R/X/L) www.webcitation.org/619zh5NCV (1563, -1, X, X- R/X/L) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (1563, , X, X- R/X/L) www.webcitation.org/619zgMPR6 (1563, -1, X, X- R/X/L) www.mozilla.org/projects/bonecho/anti-phishing/ (1563, , X, X- R/X/L) www.webcitation.org/5mq3wifwd (1563, -1, X, X- R/X/L) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (1563, , X, X- R/X/L) financialcryptography.com/mt/archives/000645.html (1563, , X, X- R/X/L) financialcryptography.com/mt/archives/000645.html (1563, , X, X- R/X/L) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.HTM (1563, , X, X- R/X/L) www.unik.no/people/josang/papers/JP2005-AusCERT.pdf (1563, , X, X- R/X/L) www.pcworld.com/article/125739-1/article.html (1563, , X, X- R/X/L) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (1563, , X, X- R/X/L) www.zdnetindia.com/news/features/stories/126569.html (1563, , X, X- R/X/L) www.webcitation.org/5w9ZCK7Pk (1563, -1, X, X- R/X/L) www2006.org/programme/item.php?id=3533 (1563, , X, X- R/X/L) isc.incidents.org/diary.php?storyid=1194 (1563, , X, X- R/X/L) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (1563, , X, X- R/X/L) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (1563, , X, X- R/X/L) web.archive.org/web/20070306 (1563, -1, X, X- R/X/L) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (1563, , X, X- R/X/L) www.hexview.com/sdp/node/24 (1563, , X, X- R/X/L) web.archive.org/web/20080320035409/http://www.hexview.com/sdp/node/24 (1563, -1, X, X- R/X/L) www.comodo.com/resources/home/phishing-scams.php (1563, , X, X- R/X/L) online.wsj.com/public/article/0,,SB112424042313615131-z_8jLB2WkfcVtgdAWf6LRh733sg_20060817,00.html?mod=blogs (1563, , X, X- R/X/L) www.cylab.cmu.edu/files/cmucylab06017.pdf (1563, , X, X- R/X/L) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (1563, , X, X- R/X/L) web.archive.org/web/20081028225500/http://www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (1563, -1, X, X- R/X/L) applications.boi.com/updates/Article?PR_ID=1430 (1563, , X, X- R/X/L) web.archive.org/web/20081007194413/http://applications.boi.com/updates/Article?PR_ID=1430 (1563, -1, X, X- R/X/L) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (1563, , X, X- R/X/L) news.biharprabha.com/2014/02/20-indians-are-victims-of-online-phishing-attacks-microsoft/ (1563, , X, X- R/X/L) www.theregister.co.uk/2005/05/03/aol_phishing/ (1563, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=15013 (1563, , X, X- R/X/L) research.microsoft.com/~cormac/Papers/PhishingAsTragedy.pdf (1563, -1, X, X- R/X/L) www.gartner.com/it/page.jsp?id=565125 (1563, , X, X- R/X/L) www.csoonline.com/talkback/071905.html (1563, , X, X- R/X/L) web.archive.org/web/20080324080028/http://www.csoonline.com/talkback/071905.html (1563, -1, X, X- R/X/L) www.met.police.uk/fraudalert/docs/internet_bank_fraud.pdf (1563, , X, X- R/X/L) www.webcitation.org/5ndG8erWg (1563, -1, X, X- R/X/L) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (1563, , X, X- R/X/L) web.archive.org/web/20050324073507/http://www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (1563, -1, X, X- R/X/L) www.techweb.com/wire/security/186701001 (1563, , X, X- R/X/L) www.symantec.com/connect/blogs/covert-redirect-flaw-oauth-not-next-heartbleed (1563, , X, X- R/X/L) www.scmagazine.com/covert-redirect-vulnerability-impacts-oauth-20-openid/article/345407/ (1563, , X, X- R/X/L) news.yahoo.com/facebook-google-users-threatened-security-192547549.html (1563, , X, X- R/X/L) thehackernews.com/2014/05/nasty-covert-redirect-vulnerability.html (1563, , X, X- R/X/L)

    User is in trusted groups rollbacker, reviewer on some wikis
  13. 2016-04-22 00:12:39 (UTC): User CoolCanuck t • c • dc • l • ef • b • bl; (251) to PhishTank (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishtank.com (R/Xmeta/L- still there)
    Other links: www.phishtank.com (251, 70, 1, 1- R/X/L)
  14. 2016-08-06 11:41:49 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Phishing (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishtank.com (R/Xmeta/L- still there)
    Other links: www.academia.edu/6495360/Assessing_the_Role_of_Conceptual_Knowledge_in_an_Anti-Phishing_Educational_Game (-1, , X, X- R/X/L) www.academia.edu/2390447/Designing_a_Mobile_Game_to_Teach_Conceptual_Knowledge_of_Avoiding_Phishing_Attacks (-1, , X, X- R/X/L) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1, , X, X- R/X/L) web.archive.org/web/20081028225500/http://www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1, -1, X, X- R/X/L) applications.boi.com/updates/Article?PR_ID=1430 (-1, , X, X- R/X/L) web.archive.org/web/20081007194413/http://applications.boi.com/updates/Article?PR_ID=1430 (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1, , X, X- R/X/L) news.biharprabha.com/2014/02/20-indians-are-victims-of-online-phishing-attacks-microsoft/ (-1, , X, X- R/X/L) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=15013 (-1, , X, X- R/X/L) research.microsoft.com/~cormac/Papers/PhishingAsTragedy.pdf (-1, -1, X, X- R/X/L) www.gartner.com/it/page.jsp?id=565125 (-1, , X, X- R/X/L) www.csoonline.com/talkback/071905.html (-1, , X, X- R/X/L) web.archive.org/web/20080324080028/http://www.csoonline.com/talkback/071905.html (-1, -1, X, X- R/X/L) www.met.police.uk/fraudalert/docs/internet_bank_fraud.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ndG8erWg (-1, -1, X, X- R/X/L) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1, , X, X- R/X/L) web.archive.org/web/20050324073507/http://www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1, -1, X, X- R/X/L) www.techweb.com/wire/security/186701001 (-1, , X, X- R/X/L) www.symantec.com/connect/blogs/covert-redirect-flaw-oauth-not-next-heartbleed (-1, , X, X- R/X/L) www.scmagazine.com/covert-redirect-vulnerability-impacts-oauth-20-openid/article/345407/ (-1, , X, X- R/X/L) news.yahoo.com/facebook-google-users-threatened-security-192547549.html (-1, , X, X- R/X/L) thehackernews.com/2014/05/nasty-covert-redirect-vulnerability.html (-1, , X, X- R/X/L) www.foxnews.com/tech/2014/05/05/facebook-google-users-threatened-by-new-security-flaw/ (-1, , X, X- R/X/L) www.tomsguide.com/us/facebook-google-covert-redirect-flaw,news-18726.html (-1, , X, X- R/X/L) tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html (-1, , X, X- R/X/L) www.cnet.com/news/serious-security-flaw-in-oauth-and-openid-discovered/ (-1, , X, X- R/X/L) www.webcitation.org/5w9Z7NfVB (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1, , X, X- R/X/L) www.eweek.com/article2/0,1895,2082039,00.asp (-1, , X, X- R/X/L) www.webcitation.org/5w9Z5zOVh (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1, , X, X- R/X/L) www.webcitation.org/5w9Z4mv7k (-1, -1, X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/technology/3608943.stm (-1, , X, X- R/X/L) www.webcitation.org/5w9Z2iACi (-1, -1, X, X- R/X/L) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1, , X, X- R/X/L) www.powershow.com/view1/1f004e-NzY0N/The_use_of_Optical_Character_Recognition_OCR_software_in_spam_filtering_powerpoint_ppt_presentation (-1, , X, X- R/X/L) www.webcitation.org/5w9YzPsN0 (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1, , X, X- R/X/L) www.thoughtcrime.org/software/sslstrip/. (-1, , X, X- R/X/L) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1, , X, X- R/X/L) q.queso.com/archives/001617 (-1, , X, X- R/X/L) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1, , X, X- R/X/L) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (-1, , X, X- R/X/L) www.shmoo.com/idn/homograph.txt (-1, , X, X- R/X/L) www.hsbcusa.com/security/recognize_fraud.html (-1, , X, X- R/X/L) www.webcitation.org/6XMoiQ5E9 (-1, -1, X, X- R/X/L) netforbeginners.about.com/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (-1, , X, X- R/X/L) www.webcitation.org/5w9YcgvUb (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1, , X, X- R/X/L) www.firmex.com/blog/spear-phishing-whos-getting-caught/ (-1, , X, X- R/X/L) www.microsoft.com/canada/athome/security/email/spear_phishing.mspx (-1, , X, X- R/X/L) www.emailanswers.com/2013/10/phishing-emails-unacceptable-failures-american-express/ (-1, , X, X- R/X/L) www.bbc.com/news/technology-25506020 (-1, , X, X- R/X/L) www.youtube.com/watch?v=fzXclG_c5Sk (-1, -1, X, X- R/X/L) www.fraudwatchinternational.com (-1, , X, X- R/X/L) www.webcitation.org/5QVOm5OO1 (-1, -1, X, X- R/X/L) www.millersmiles.co.uk (-1, , X, X- R/X/L) apwg.org/reports/apwg_report_Q3_2009.pdf (-1, 999999999, X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (-1, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (-1, , X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (-1, , X, X- R/X/L) www.webcitation.org/5gY2R1j1g (-1, -1, X, X- R/X/L) rapidshare.de/en/phishing.html (-1, , X, X- R/X/L) web.archive.org/web/20080430101024/http://rapidshare.de/en/phishing.html (-1, -1, X, X- R/X/L) dx.doi.org/10.1145/1290958.1290968 (-1, , X, X- R/X/L) www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (-1, , X, X- R/X/L) web.archive.org/web/20061205104430/http://www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (-1, -1, X, X- R/X/L) www.pcworld.com/resource/article/0,aid,125956,pg,1,RSS,RSS,00.asp (-1, , X, X- R/X/L) www.browser-recon.info (-1, , X, X- R/X/L) www.webcitation.org/5w9YXj9AJ (-1, -1, X, X- R/X/L) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1, , X, X- R/X/L) www.icann.org/news/announcement-2-2014-12-16-en (-1, , X, X- R/X/L) www.usatoday.com/story/money/business/2014/11/06/home-depot-hackers-stolen-data/18613167/ (-1, , X, X- R/X/L) www.nytimes.com/2011/05/28/business/28hack.html (-1, , X, X- R/X/L) blogs.rsa.com/anatomy-of-an-attack/ (-1, , X, X- R/X/L) 247wallst.com/retail/2014/05/05/target-ceo-sacked/ (-1, , X, X- R/X/L) bringmethenews.com/2014/02/12/report-email-phishing-scam-led-to-target-breach/ (-1, , X, X- R/X/L) www.dodbuzz.com/2011/08/22/report-chinese-tv-doc-reveals-cyber-mischief/ (-1, , X, X- R/X/L) www.computerworld.com/s/article/9219155/Suspected_Chinese_spear_phishing_attacks_continue_to_hit_Gmail_users (-1, , X, X- R/X/L) firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1272/1192 (-1, , X, X- R/X/L) www.webcitation.org/5w9YVyMYn (-1, -1, X, X- R/X/L) itmanagement.earthweb.com/secu/article.php/3451501 (-1, , X, X- R/X/L) financialcryptography.com/mt/archives/000609.html (-1, , X, X- R/X/L) www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?page=all (-1, , X, X- R/X/L) www.webcitation.org/5w9YV2fuL (-1, -1, X, X- R/X/L) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1, , X, X- R/X/L) www.phishing.org/history-of-phishing/ (-1, , X, X- R/X/L) www.phishing.org/history-of-phishing/ (-1, , X, X- R/X/L) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1, , X, X- R/X/L) www.wordspy.com/words/phishing.asp (-1, , X, X- R/X/L) www.antiphishing.org/resources/apwg-reports/ (-1, , X, X- R/X/L) simson.net/clips/1995/95.SJMN.AOL_Hackers.html (-1, , X, X- R/X/L) www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf (-1, , X, X- R/X/L) isc.sans.org/diary.php?storyid=1905 (-1, 176, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html (-1, 469, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (-1, 469, X, X- R/X/L) books.google.com/books?id=I-9P1EkTkigC&pg=PA433 (-1, -1, X, X- R/X/L) www.yourbank.example.com (-1, , X, X- R/X/L) d-nb.info/gnd/7515821-8 (-1, -1, X, X- R/X/L) scamletters.info (-1, , X, X- R/X/L) www.plixer.com/phishing-attack-education/click-click-phish.html (-1, , X, X- R/X/L) www.vpnanswers.com/what-are-phishing-attacks-types-and-methods-of-prevention/ (-1, , X, X- R/X/L) www.scamdex.com/Phishing-index.php (-1, , X, X- R/X/L) www.cl.cam.ac.uk/%7Ernc1/takedown.pdf (-1, -1, X, X- R/X/L) www.phishtank.com (-1, 70, X, X- R/X/L) research.microsoft.com/en-us/um/people/cormac/Papers/PhishingAsTragedy.pdf (-1, -1, X, X- R/X/L) www.honeynet.org/papers/phishing/ (-1, 309, X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1, 999999999, X, X- R/X/L) www.utica.edu/academic/institutes/cimip/ (-1, 999999999, X, X- R/X/L) www.AntiPhishing.org (-1, , X, X- R/X/L) www.informationweek.com/story/showArticle.jhtml?articleID=199903450 (-1, , X, X- R/X/L) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1, , X, X- R/X/L) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1, , X, X- R/X/L) www.pcmag.com/article2/0,1895,2085183,00.asp (-1, , X, X- R/X/L) www.earthlink.net/about/press/pr_phishersite/ (-1, , X, X- R/X/L) web.archive.org/web/20070705211932/http://www.earthlink.net/about/press/pr_phishersite/ (-1, -1, X, X- R/X/L) www.washingtonpost.com/wp-dyn/articles/A40578-2005Apr9.html (-1, , X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+HB2471 (-1, , X, X- R/X/L) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1, , X, X- R/X/L) web.archive.org/web/20070131204118/http://media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1, -1, X, X- R/X/L) corp.aol.com/whoweare/history/2006.shtml (-1, , X, X- R/X/L) web.archive.org/web/20070522231137/http://www.corp.aol.com/whoweare/history/2006.shtml (-1, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1, , X, X- R/X/L) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1, , X, X- R/X/L) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1, , X, X- R/X/L) web.archive.org/web/20051103190357/http://www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1, , X, X- R/X/L) www.webcitation.org/61A2zw5D2 (-1, -1, X, X- R/X/L) www.opsi.gov.uk/ACTS/en2006/2006en35.htm (-1, , X, X- R/X/L) informationweek.com/story/showArticle.jhtml?articleID=60404811 (-1, , X, X- R/X/L) www.webcitation.org/5w9ZIR3zi (-1, -1, X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1, , X, X- R/X/L) www.justice.gov/archive/opa/pr/2004/October/04_crm_726.htm (-1, , X, X- R/X/L) www.eweek.com/article2/0%2C1895%2C1831960%2C00.asp (-1, , X, X- R/X/L) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1, , X, X- R/X/L) www.cnn.com/2003/TECH/internet/07/21/phishing.scam/index.html (-1, , X, X- R/X/L) www.forbes.com/sites/josephsteinberg/2014/08/25/why-you-are-at-risk-of-phishing-attacks-and-why-jp-morgan-chase-customers-were-targeted-this-week/ (-1, , X, X- R/X/L) www.safesigner.com (-1, , X, X- R/X/L) consumerscams.org/scam_safety_tips/how_to_report_phishing_scam (-1, , X, X- R/X/L) www.google.com/safebrowsing/report_phish/ (-1, , X, X- R/X/L) www.ftc.gov/phonefraud (-1, , X, X- R/X/L) www.webcitation.org/5w9ZHYbnJ (-1, -1, X, X- R/X/L) www.schneier.com/blog/archives/2006/10/phishtank.html (-1, , X, X- R/X/L) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1, , X, X- R/X/L) www.webcitation.org/5w9ZGndsq (-1, -1, X, X- R/X/L) www.antiphishing.org/solutions.html#takedown (-1, , X, X- R/X/L) reports-archive.adm.cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf (-1, , X, X- R/X/L) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080216101637/http://www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1, -1, X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1568494611002547 (-1, , X, X- R/X/L) www.inf.ufpr.br/lesoliveira/download/ASOC2011.pdf (-1, , X, X- R/X/L) www.confidenttechnologies.com/products/anti-phishing (-1, , X, X- R/X/L) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080406062148/http://people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1, -1, X, X- R/X/L) www.schneier.com/blog/archives/2005/07/security_skins.html (-1, , X, X- R/X/L) www.ovum.com/news/euronews.asp?id=4166 (-1, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=14384 (-1, , X, X- R/X/L) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080406062148/http://www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1, -1, X, X- R/X/L) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/AR2005071302181.html (-1, , X, X- R/X/L) www.webcitation.org/619zhkpkk (-1, -1, X, X- R/X/L) www.bankofamerica.com (-1, , X, X- R/X/L) www.eweek.com/article2/0,1759,1630161,00.asp (-1, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1, , X, X- R/X/L) www.webcitation.org/612DwHoBd (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=99089&WT.svl=news1_1 (-1, , X, X- R/X/L) www.webcitation.org/5w9ZE56Uy (-1, -1, X, X- R/X/L) www.mozilla.org/security/phishing-test.html (-1, , X, X- R/X/L) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1, , X, X- R/X/L) www.3sharp.com/projects/antiphish/index.htm (-1, , X, X- R/X/L) web.archive.org/web/20080114211315/http://www.3sharp.com/projects/antiphish/index.htm (-1, -1, X, X- R/X/L) www.webcitation.org/619zh5NCV (-1, -1, X, X- R/X/L) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (-1, , X, X- R/X/L) www.webcitation.org/619zgMPR6 (-1, -1, X, X- R/X/L) www.mozilla.org/projects/bonecho/anti-phishing/ (-1, , X, X- R/X/L) www.webcitation.org/5mq3wifwd (-1, -1, X, X- R/X/L) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1, , X, X- R/X/L) financialcryptography.com/mt/archives/000645.html (-1, , X, X- R/X/L) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.HTM (-1, , X, X- R/X/L) www.unik.no/people/josang/papers/JP2005-AusCERT.pdf (-1, , X, X- R/X/L) www.pcworld.com/article/125739-1/article.html (-1, , X, X- R/X/L) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (-1, , X, X- R/X/L) www.zdnetindia.com/news/features/stories/126569.html (-1, , X, X- R/X/L) www.webcitation.org/5w9ZCK7Pk (-1, -1, X, X- R/X/L) www2006.org/programme/item.php?id=3533 (-1, , X, X- R/X/L) isc.incidents.org/diary.php?storyid=1194 (-1, , X, X- R/X/L) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (-1, , X, X- R/X/L) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (-1, , X, X- R/X/L) www.hexview.com/sdp/node/24 (-1, , X, X- R/X/L) web.archive.org/web/20080320035409/http://www.hexview.com/sdp/node/24 (-1, -1, X, X- R/X/L) www.comodo.com/resources/home/phishing-scams.php (-1, , X, X- R/X/L) online.wsj.com/public/article/0,,SB112424042313615131-z_8jLB2WkfcVtgdAWf6LRh733sg_20060817,00.html?mod=blogs (-1, , X, X- R/X/L) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  15. 2016-09-26 13:50:31 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Phishing (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishtank.com (R/Xmeta/L- still there)
    Other links: isc.sans.org/diary.php?storyid=1905 (-1, 176, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html (-1, 469, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (-1, 469, X, X- R/X/L) books.google.com/books?id=I-9P1EkTkigC&pg=PA433 (-1, -1, X, X- R/X/L) www.yourbank.example.com (-1, , X, X- R/X/L) d-nb.info/gnd/7515821-8 (-1, -1, X, X- R/X/L) scamletters.info (-1, , X, X- R/X/L) www.plixer.com/phishing-attack-education/click-click-phish.html (-1, , X, X- R/X/L) www.vpnanswers.com/what-are-phishing-attacks-types-and-methods-of-prevention/ (-1, , X, X- R/X/L) www.scamdex.com/Phishing-index.php (-1, , X, X- R/X/L) www.cl.cam.ac.uk/%7Ernc1/takedown.pdf (-1, -1, X, X- R/X/L) www.phishtank.com (-1, 70, X, X- R/X/L) research.microsoft.com/en-us/um/people/cormac/Papers/PhishingAsTragedy.pdf (-1, -1, X, X- R/X/L) www.honeynet.org/papers/phishing/ (-1, 309, X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1, 999999999, X, X- R/X/L) www.utica.edu/academic/institutes/cimip/ (-1, 999999999, X, X- R/X/L) www.AntiPhishing.org (-1, , X, X- R/X/L) www.informationweek.com/story/showArticle.jhtml?articleID=199903450 (-1, , X, X- R/X/L) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1, , X, X- R/X/L) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1, , X, X- R/X/L) www.pcmag.com/article2/0,1895,2085183,00.asp (-1, , X, X- R/X/L) www.earthlink.net/about/press/pr_phishersite/ (-1, , X, X- R/X/L) web.archive.org/web/20070705211932/http://www.earthlink.net/about/press/pr_phishersite/ (-1, -1, X, X- R/X/L) www.washingtonpost.com/wp-dyn/articles/A40578-2005Apr9.html (-1, , X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+HB2471 (-1, , X, X- R/X/L) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1, , X, X- R/X/L) web.archive.org/web/20070131204118/http://media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1, -1, X, X- R/X/L) corp.aol.com/whoweare/history/2006.shtml (-1, , X, X- R/X/L) web.archive.org/web/20070522231137/http://www.corp.aol.com/whoweare/history/2006.shtml (-1, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1, , X, X- R/X/L) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1, , X, X- R/X/L) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1, , X, X- R/X/L) web.archive.org/web/20051103190357/http://www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1, , X, X- R/X/L) www.webcitation.org/61A2zw5D2 (-1, -1, X, X- R/X/L) www.opsi.gov.uk/ACTS/en2006/2006en35.htm (-1, , X, X- R/X/L) informationweek.com/story/showArticle.jhtml?articleID=60404811 (-1, , X, X- R/X/L) www.webcitation.org/5w9ZIR3zi (-1, -1, X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1, , X, X- R/X/L) www.justice.gov/archive/opa/pr/2004/October/04_crm_726.htm (-1, , X, X- R/X/L) www.eweek.com/article2/0%2C1895%2C1831960%2C00.asp (-1, , X, X- R/X/L) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1, , X, X- R/X/L) www.cnn.com/2003/TECH/internet/07/21/phishing.scam/index.html (-1, , X, X- R/X/L) www.forbes.com/sites/josephsteinberg/2014/08/25/why-you-are-at-risk-of-phishing-attacks-and-why-jp-morgan-chase-customers-were-targeted-this-week/ (-1, , X, X- R/X/L) www.safesigner.com (-1, , X, X- R/X/L) consumerscams.org/scam_safety_tips/how_to_report_phishing_scam (-1, , X, X- R/X/L) www.google.com/safebrowsing/report_phish/ (-1, , X, X- R/X/L) www.ftc.gov/phonefraud (-1, , X, X- R/X/L) www.webcitation.org/5w9ZHYbnJ (-1, -1, X, X- R/X/L) www.schneier.com/blog/archives/2006/10/phishtank.html (-1, , X, X- R/X/L) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1, , X, X- R/X/L) www.webcitation.org/5w9ZGndsq (-1, -1, X, X- R/X/L) www.antiphishing.org/solutions.html#takedown (-1, , X, X- R/X/L) reports-archive.adm.cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf (-1, , X, X- R/X/L) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080216101637/http://www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1, -1, X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1568494611002547 (-1, , X, X- R/X/L) www.inf.ufpr.br/lesoliveira/download/ASOC2011.pdf (-1, , X, X- R/X/L) www.confidenttechnologies.com/products/anti-phishing (-1, , X, X- R/X/L) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1, , X, X- R/X/L) web.archive.org/web/20070629113158/http://people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1, -1, X, X- R/X/L) www.schneier.com/blog/archives/2005/07/security_skins.html (-1, , X, X- R/X/L) www.ovum.com/news/euronews.asp?id=4166 (-1, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=14384 (-1, , X, X- R/X/L) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080720092117/http://www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1, -1, X, X- R/X/L) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/AR2005071302181.html (-1, , X, X- R/X/L) www.webcitation.org/619zhkpkk (-1, -1, X, X- R/X/L) www.bankofamerica.com (-1, , X, X- R/X/L) www.eweek.com/article2/0,1759,1630161,00.asp (-1, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1, , X, X- R/X/L) www.webcitation.org/612DwHoBd (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=99089&WT.svl=news1_1 (-1, , X, X- R/X/L) www.webcitation.org/5w9ZE56Uy (-1, -1, X, X- R/X/L) www.mozilla.org/security/phishing-test.html (-1, , X, X- R/X/L) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1, , X, X- R/X/L) www.3sharp.com/projects/antiphish/index.htm (-1, , X, X- R/X/L) www.webcitation.org/619zh5NCV (-1, -1, X, X- R/X/L) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (-1, , X, X- R/X/L) www.webcitation.org/619zgMPR6 (-1, -1, X, X- R/X/L) www.mozilla.org/projects/bonecho/anti-phishing/ (-1, , X, X- R/X/L) www.webcitation.org/5mq3wifwd (-1, -1, X, X- R/X/L) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1, , X, X- R/X/L) financialcryptography.com/mt/archives/000645.html (-1, , X, X- R/X/L) www.arraydev.com/commerce/jibc/2005-02/jibc_phishing.HTM (-1, , X, X- R/X/L) www.unik.no/people/josang/papers/JP2005-AusCERT.pdf (-1, , X, X- R/X/L) www.pcworld.com/article/125739-1/article.html (-1, , X, X- R/X/L) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (-1, , X, X- R/X/L) www.zdnetindia.com/news/features/stories/126569.html (-1, , X, X- R/X/L) www.webcitation.org/5w9ZCK7Pk (-1, -1, X, X- R/X/L) www2006.org/programme/item.php?id=3533 (-1, , X, X- R/X/L) isc.incidents.org/diary.php?storyid=1194 (-1, , X, X- R/X/L) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (-1, , X, X- R/X/L) web.archive.org/web/20070306171850/http://www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (-1, -1, X, X- R/X/L) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (-1, , X, X- R/X/L) www.hexview.com/sdp/node/24 (-1, , X, X- R/X/L) web.archive.org/web/20080320035409/http://www.hexview.com/sdp/node/24 (-1, -1, X, X- R/X/L) www.comodo.com/resources/home/phishing-scams.php (-1, , X, X- R/X/L) online.wsj.com/public/article/0,,SB112424042313615131-z_8jLB2WkfcVtgdAWf6LRh733sg_20060817,00.html?mod=blogs (-1, , X, X- R/X/L) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1, , X, X- R/X/L) www.academia.edu/6495360/Assessing_the_Role_of_Conceptual_Knowledge_in_an_Anti-Phishing_Educational_Game (-1, , X, X- R/X/L) www.academia.edu/2390447/Designing_a_Mobile_Game_to_Teach_Conceptual_Knowledge_of_Avoiding_Phishing_Attacks (-1, , X, X- R/X/L) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1, , X, X- R/X/L) web.archive.org/web/20081028225500/http://www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1, -1, X, X- R/X/L) applications.boi.com/updates/Article?PR_ID=1430 (-1, , X, X- R/X/L) web.archive.org/web/20081007194413/http://applications.boi.com/updates/Article?PR_ID=1430 (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1, , X, X- R/X/L) news.biharprabha.com/2014/02/20-indians-are-victims-of-online-phishing-attacks-microsoft/ (-1, , X, X- R/X/L) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=15013 (-1, , X, X- R/X/L) research.microsoft.com/~cormac/Papers/PhishingAsTragedy.pdf (-1, -1, X, X- R/X/L) www.gartner.com/it/page.jsp?id=565125 (-1, , X, X- R/X/L) www.csoonline.com/talkback/071905.html (-1, , X, X- R/X/L) web.archive.org/web/20080324080028/http://www.csoonline.com/talkback/071905.html (-1, -1, X, X- R/X/L) www.met.police.uk/fraudalert/docs/internet_bank_fraud.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ndG8erWg (-1, -1, X, X- R/X/L) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1, , X, X- R/X/L) web.archive.org/web/20050324073507/http://www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1, -1, X, X- R/X/L) www.techweb.com/wire/security/186701001 (-1, , X, X- R/X/L) www.symantec.com/connect/blogs/covert-redirect-flaw-oauth-not-next-heartbleed (-1, , X, X- R/X/L) www.scmagazine.com/covert-redirect-vulnerability-impacts-oauth-20-openid/article/345407/ (-1, , X, X- R/X/L) news.yahoo.com/facebook-google-users-threatened-security-192547549.html (-1, , X, X- R/X/L) thehackernews.com/2014/05/nasty-covert-redirect-vulnerability.html (-1, , X, X- R/X/L) www.foxnews.com/tech/2014/05/05/facebook-google-users-threatened-by-new-security-flaw/ (-1, , X, X- R/X/L) www.tomsguide.com/us/facebook-google-covert-redirect-flaw,news-18726.html (-1, , X, X- R/X/L) tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html (-1, , X, X- R/X/L) www.cnet.com/news/serious-security-flaw-in-oauth-and-openid-discovered/ (-1, , X, X- R/X/L) www.webcitation.org/5w9Z7NfVB (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1, , X, X- R/X/L) www.eweek.com/article2/0,1895,2082039,00.asp (-1, , X, X- R/X/L) www.webcitation.org/5w9Z5zOVh (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1, , X, X- R/X/L) www.webcitation.org/5w9Z4mv7k (-1, -1, X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/technology/3608943.stm (-1, , X, X- R/X/L) www.webcitation.org/5w9Z2iACi (-1, -1, X, X- R/X/L) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1, , X, X- R/X/L) www.powershow.com/view1/1f004e-NzY0N/The_use_of_Optical_Character_Recognition_OCR_software_in_spam_filtering_powerpoint_ppt_presentation (-1, , X, X- R/X/L) www.webcitation.org/5w9YzPsN0 (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1, , X, X- R/X/L) www.thoughtcrime.org/software/sslstrip/. (-1, , X, X- R/X/L) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1, , X, X- R/X/L) q.queso.com/archives/001617 (-1, , X, X- R/X/L) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1, , X, X- R/X/L) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (-1, , X, X- R/X/L) www.shmoo.com/idn/homograph.txt (-1, , X, X- R/X/L) www.hsbcusa.com/security/recognize_fraud.html (-1, , X, X- R/X/L) www.webcitation.org/6XMoiQ5E9 (-1, -1, X, X- R/X/L) netforbeginners.about.com/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (-1, , X, X- R/X/L) www.webcitation.org/5w9YcgvUb (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1, , X, X- R/X/L) www.firmex.com/blog/spear-phishing-whos-getting-caught/ (-1, , X, X- R/X/L) www.microsoft.com/canada/athome/security/email/spear_phishing.mspx (-1, , X, X- R/X/L) www.emailanswers.com/2013/10/phishing-emails-unacceptable-failures-american-express/ (-1, , X, X- R/X/L) www.bbc.com/news/technology-25506020 (-1, , X, X- R/X/L) www.youtube.com/watch?v=fzXclG_c5Sk (-1, -1, X, X- R/X/L) www.fraudwatchinternational.com (-1, , X, X- R/X/L) www.webcitation.org/5QVOm5OO1 (-1, -1, X, X- R/X/L) www.millersmiles.co.uk (-1, , X, X- R/X/L) apwg.org/reports/apwg_report_Q3_2009.pdf (-1, 999999999, X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (-1, , X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (-1, , X, X- R/X/L) www.webcitation.org/5gY2R1j1g (-1, -1, X, X- R/X/L) rapidshare.de/en/phishing.html (-1, , X, X- R/X/L) web.archive.org/web/20080430101024/http://rapidshare.de/en/phishing.html (-1, -1, X, X- R/X/L) dx.doi.org/10.1145/1290958.1290968 (-1, , X, X- R/X/L) www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (-1, , X, X- R/X/L) web.archive.org/web/20061205104430/http://www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (-1, -1, X, X- R/X/L) www.pcworld.com/resource/article/0,aid,125956,pg,1,RSS,RSS,00.asp (-1, , X, X- R/X/L) www.browser-recon.info (-1, , X, X- R/X/L) www.webcitation.org/5w9YXj9AJ (-1, -1, X, X- R/X/L) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1, , X, X- R/X/L) www.icann.org/news/announcement-2-2014-12-16-en (-1, , X, X- R/X/L) www.usatoday.com/story/money/business/2014/11/06/home-depot-hackers-stolen-data/18613167/ (-1, , X, X- R/X/L) www.nytimes.com/2011/05/28/business/28hack.html (-1, , X, X- R/X/L) blogs.rsa.com/anatomy-of-an-attack/ (-1, , X, X- R/X/L) 247wallst.com/retail/2014/05/05/target-ceo-sacked/ (-1, , X, X- R/X/L) bringmethenews.com/2014/02/12/report-email-phishing-scam-led-to-target-breach/ (-1, , X, X- R/X/L) www.dodbuzz.com/2011/08/22/report-chinese-tv-doc-reveals-cyber-mischief/ (-1, , X, X- R/X/L) www.computerworld.com/s/article/9219155/Suspected_Chinese_spear_phishing_attacks_continue_to_hit_Gmail_users (-1, , X, X- R/X/L) firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1272/1192 (-1, , X, X- R/X/L) www.webcitation.org/5w9YVyMYn (-1, -1, X, X- R/X/L) itmanagement.earthweb.com/secu/article.php/3451501 (-1, , X, X- R/X/L) financialcryptography.com/mt/archives/000609.html (-1, , X, X- R/X/L) www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?page=all (-1, , X, X- R/X/L) www.webcitation.org/5w9YV2fuL (-1, -1, X, X- R/X/L) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1, , X, X- R/X/L) www.phishing.org/history-of-phishing/ (-1, , X, X- R/X/L) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1, , X, X- R/X/L) www.wordspy.com/words/phishing.asp (-1, , X, X- R/X/L) www.antiphishing.org/resources/apwg-reports/ (-1, , X, X- R/X/L) simson.net/clips/1995/95.SJMN.AOL_Hackers.html (-1, , X, X- R/X/L) www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  16. 2016-11-08 00:57:38 (UTC): w:it:User:Xarvus (t - c; 97) to w:it:WOT Services (diff  !top) - Link: www.phishtank.com/friends.php (R/Xmeta/L- still there)
    Other links: www.spiegel.de/netzwelt/web/web-of-trust-mozilla-loescht-umstrittenes-add-on-a-1119666.html (97, -1, X, X- R/X/L) www.ilsoftware.it/articoli.asp?tag=Estensioni-browser-irrispettose-della-privacy-il-caso-WOT_14589 (97, 189, 1, 1- R/X/L) www.mywot.com/en/privacy/privacy_policy (97, 431, 1, 0- R/X/L) www.youtube.com/watch?v=t20jeSzLUBo (97, -1, X, X- R/X/L) www.globalsign.eu/company/press/2/031511-globalsign-partners-with-web-of-trust-in-website-passport-project.html (97, 14, 1, 1- R/X/L) www.phishtank.com/friends.php (97, 70, 1, 1- R/X/L) thejournal.com/articles/2009/08/11/panda-security-against-intuition-offer-free-web-of-trust-browser-addon.aspx?sc_lang=en (97, 1408, X, X- R/X/L) www.reuters.com/article/2012/08/08/idUS142454+08-Aug-2012+BW20120808 (97, -1, X, X- R/X/L) www.facebook.com/notes/facebook-security/keeping-you-safe-from-scams-and-spam/10150174826745766 (97, -1, X, X- R/X/L)
  17. 2017-04-12 20:48:14 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Phishing (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishtank.com (R/Xmeta/L- still there)
    Other links: simson.net/clips/1995/95.SJMN.AOL_Hackers.html (-1, , X, X- R/X/L) www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?page=all (-1, , X, X- R/X/L) www.met.police.uk/fraudalert/docs/internet_bank_fraud.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ndG8erWg?url=http%3A%2F%2Fwww.met.police.uk%2Ffraudalert%2Fdocs%2Finternet_bank_fraud.pdf (-1, -1, X, X- R/X/L) www.belvoircreditunion.org/system/files/336/original/PhishinMembers.pdf (-1, , X, X- R/X/L) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1, , X, X- R/X/L) web.archive.org/web/20050324073507/http://www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1, -1, X, X- R/X/L) www.techweb.com/wire/security/186701001 (-1, , X, X- R/X/L) www.archersecuritygroup.com/fake-news-can-poison-computer-well-mind/ (-1, , X, X- R/X/L) www.chicagotribune.com/bluesky/originals/ct-gmail-phishing-attack-uiuc-bsi-20170119-story.html (-1, , X, X- R/X/L) www.symantec.com/connect/blogs/covert-redirect-flaw-oauth-not-next-heartbleed (-1, , X, X- R/X/L) www.scmagazine.com/covert-redirect-vulnerability-impacts-oauth-20-openid/article/345407/ (-1, , X, X- R/X/L) news.yahoo.com/facebook-google-users-threatened-security-192547549.html (-1, , X, X- R/X/L) thehackernews.com/2014/05/nasty-covert-redirect-vulnerability.html (-1, , X, X- R/X/L) www.foxnews.com/tech/2014/05/05/facebook-google-users-threatened-by-new-security-flaw/ (-1, , X, X- R/X/L) www.tomsguide.com/us/facebook-google-covert-redirect-flaw,news-18726.html (-1, , X, X- R/X/L) tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html (-1, , X, X- R/X/L) www.cnet.com/news/serious-security-flaw-in-oauth-and-openid-discovered/ (-1, , X, X- R/X/L) www.webcitation.org/5w9Z7NfVB?url=http%3A%2F%2Fnews.netcraft.com%2Farchives%2F2007%2F01%2F15%2Fphishing_attacks_continue_to_grow_in_sophistication.html (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1, , X, X- R/X/L) www.eweek.com/article2/0,1895,2082039,00.asp (-1, , X, X- R/X/L) www.webcitation.org/5w9Z5zOVh?url=http%3A%2F%2Fnews.netcraft.com%2Farchives%2F2006%2F06%2F16%2Fpaypal_security_flaw_allows_identity_theft.html (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1, , X, X- R/X/L) www.webcitation.org/5w9Z4mv7k?url=http%3A%2F%2Fblog.washingtonpost.com%2Fsecurityfix%2F2006%2F06%2Fflaws_in_financial_sites_aid_s.html (-1, -1, X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/technology/3608943.stm (-1, , X, X- R/X/L) www.webcitation.org/5w9Z2iACi?url=http%3A%2F%2Fwww.fraudwatchinternational.com%2Fphishing-fraud%2Fphishing-web-site-methods%2F (-1, -1, X, X- R/X/L) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1, , X, X- R/X/L) www.powershow.com/view1/1f004e-NzY0N/The_use_of_Optical_Character_Recognition_OCR_software_in_spam_filtering_powerpoint_ppt_presentation (-1, , X, X- R/X/L) www.webcitation.org/5w9YzPsN0?url=http%3A%2F%2Fnews.netcraft.com%2Farchives%2F2005%2F05%2F12%2Ffraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1, , X, X- R/X/L) www.thoughtcrime.org/software/sslstrip/. (-1, , X, X- R/X/L) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1, , X, X- R/X/L) q.queso.com/archives/001617 (-1, , X, X- R/X/L) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1, , X, X- R/X/L) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (-1, , X, X- R/X/L) www.shmoo.com/idn/homograph.txt (-1, , X, X- R/X/L) www.hsbcusa.com/security/recognize_fraud.html (-1, , X, X- R/X/L) www.webcitation.org/6mfqUkatY?url=http://www.bustspammers.com/phishing_links.html (-1, -1, X, X- R/X/L) www.bustspammers.com/phishing_links.html (-1, , X, X- R/X/L) web.archive.org/web/20111018140959/http://netforbeginners.about.com:80/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (-1, -1, X, X- R/X/L) netforbeginners.about.com/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (-1, , X, X- R/X/L) www.webcitation.org/5w9YcgvUb?url=http%3A%2F%2Fwww.theregister.co.uk%2F2008%2F04%2F16%2Fwhaling_expedition_continues%2F (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1, , X, X- R/X/L) www.firmex.com/blog/spear-phishing-whos-getting-caught/ (-1, , X, X- R/X/L) www.microsoft.com/canada/athome/security/email/spear_phishing.mspx (-1, , X, X- R/X/L) www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf (-1, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (-1, 469, X, X- R/X/L) isc.sans.org/diary.php?storyid=1905 (-1, 176, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html (-1, 469, X, X- R/X/L) news.biharprabha.com/2014/02/20-indians-are-victims-of-online-phishing-attacks-microsoft/ (-1, , X, X- R/X/L) books.google.com/books?id=I-9P1EkTkigC&pg=PA433 (-1, -1, X, X- R/X/L) www.yourbank.example.com (-1, , X, X- R/X/L) d-nb.info/gnd/7515821-8 (-1, -1, X, X- R/X/L) www.cl.cam.ac.uk/%7Ernc1/takedown.pdf (-1, -1, X, X- R/X/L) www.phishtank.com (-1, 70, X, X- R/X/L) research.microsoft.com/en-us/um/people/cormac/Papers/PhishingAsTragedy.pdf (-1, -1, X, X- R/X/L) www.honeynet.org/papers/phishing/ (-1, 309, X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1, 999999999, X, X- R/X/L) www.utica.edu/academic/institutes/cimip/ (-1, 999999999, X, X- R/X/L) www.AntiPhishing.org (-1, , X, X- R/X/L) www.informationweek.com/story/showArticle.jhtml?articleID=199903450 (-1, , X, X- R/X/L) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1, , X, X- R/X/L) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1, , X, X- R/X/L) www.pcmag.com/article2/0,1895,2085183,00.asp (-1, , X, X- R/X/L) www.earthlink.net/about/press/pr_phishersite/ (-1, , X, X- R/X/L) web.archive.org/web/20070705211932/http://www.earthlink.net/about/press/pr_phishersite/ (-1, -1, X, X- R/X/L) www.washingtonpost.com/wp-dyn/articles/A40578-2005Apr9.html (-1, , X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+HB2471 (-1, , X, X- R/X/L) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1, , X, X- R/X/L) web.archive.org/web/20070131204118/http://media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1, -1, X, X- R/X/L) corp.aol.com/whoweare/history/2006.shtml (-1, , X, X- R/X/L) web.archive.org/web/20070522231137/http://www.corp.aol.com/whoweare/history/2006.shtml (-1, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1, , X, X- R/X/L) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1, , X, X- R/X/L) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1, , X, X- R/X/L) web.archive.org/web/20051103190357/http://www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1, , X, X- R/X/L) www.webcitation.org/61A2zw5D2?url=http%3A%2F%2Fwww.opsi.gov.uk%2FACTS%2Fen2006%2F2006en35.htm (-1, -1, X, X- R/X/L) www.opsi.gov.uk/ACTS/en2006/2006en35.htm (-1, , X, X- R/X/L) informationweek.com/story/showArticle.jhtml?articleID=60404811 (-1, , X, X- R/X/L) www.webcitation.org/5w9ZIR3zi?url=http%3A%2F%2Fwww.sophos.com%2Fpressoffice%2Fnews%2Farticles%2F2006%2F11%2Fphishing-arrests.html (-1, -1, X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1, , X, X- R/X/L) www.justice.gov/archive/opa/pr/2004/October/04_crm_726.htm (-1, , X, X- R/X/L) www.eweek.com/article2/0%2C1895%2C1831960%2C00.asp (-1, , X, X- R/X/L) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1, , X, X- R/X/L) www.cnn.com/2003/TECH/internet/07/21/phishing.scam/index.html (-1, , X, X- R/X/L) www.forbes.com/sites/josephsteinberg/2014/08/25/why-you-are-at-risk-of-phishing-attacks-and-why-jp-morgan-chase-customers-were-targeted-this-week/ (-1, , X, X- R/X/L) www.safesigner.com (-1, , X, X- R/X/L) consumerscams.org/scam_safety_tips/how_to_report_phishing_scam (-1, , X, X- R/X/L) www.google.com/safebrowsing/report_phish/ (-1, , X, X- R/X/L) www.ftc.gov/phonefraud (-1, , X, X- R/X/L) www.webcitation.org/5w9ZHYbnJ?url=http%3A%2F%2Fwww.schneier.com%2Fblog%2Farchives%2F2006%2F10%2Fphishtank.html (-1, -1, X, X- R/X/L) www.schneier.com/blog/archives/2006/10/phishtank.html (-1, , X, X- R/X/L) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1, , X, X- R/X/L) www.webcitation.org/5w9ZGndsq?url=http%3A%2F%2Fwww.antiphishing.org%2Fsolutions.html%23takedown (-1, -1, X, X- R/X/L) www.antiphishing.org/solutions.html#takedown (-1, , X, X- R/X/L) reports-archive.adm.cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf (-1, , X, X- R/X/L) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080216101637/http://www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1, -1, X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1568494611002547 (-1, , X, X- R/X/L) www.inf.ufpr.br/lesoliveira/download/ASOC2011.pdf (-1, , X, X- R/X/L) www.confidenttechnologies.com/products/anti-phishing (-1, , X, X- R/X/L) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1, , X, X- R/X/L) web.archive.org/web/20070629113158/http://people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1, -1, X, X- R/X/L) www.schneier.com/blog/archives/2005/07/security_skins.html (-1, , X, X- R/X/L) www.ovum.com/news/euronews.asp?id=4166 (-1, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=14384 (-1, , X, X- R/X/L) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080720092117/http://www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1, -1, X, X- R/X/L) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/AR2005071302181.html (-1, , X, X- R/X/L) www.webcitation.org/619zhkpkk?url=http%3A%2F%2Fwww.bankofamerica.com%2Fprivacy%2Fsitekey%2F (-1, -1, X, X- R/X/L) www.bankofamerica.com (-1, , X, X- R/X/L) www.eweek.com/article2/0,1759,1630161,00.asp (-1, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1, , X, X- R/X/L) www.webcitation.org/612DwHoBd?url=http://www.darkreading.com/document.asp?doc_id%3D99089%26WT.svl%3Dnews1_1 (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=99089&WT.svl=news1_1 (-1, , X, X- R/X/L) www.webcitation.org/5w9ZE56Uy?url=http%3A%2F%2Fwww.mozilla.org%2Fsecurity%2Fphishing-test.html (-1, -1, X, X- R/X/L) www.mozilla.org/security/phishing-test.html (-1, , X, X- R/X/L) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1, , X, X- R/X/L) www.3sharp.com/projects/antiphish/index.htm (-1, , X, X- R/X/L) archive.is/20080114211315/http://www.3sharp.com/projects/antiphish/index.htm (-1, -1, X, X- R/X/L) www.webcitation.org/619zh5NCV?url=http%3A%2F%2Farstechnica.com%2Fjournals%2Fapple.ars%2F2008%2F11%2F13%2Fsafari-3-2-finally-gains-phishing-protection (-1, -1, X, X- R/X/L) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (-1, , X, X- R/X/L) www.webcitation.org/619zgMPR6?url=http%3A%2F%2Fwww.mozilla.org%2Fprojects%2Fbonecho%2Fanti-phishing%2F (-1, -1, X, X- R/X/L) www.mozilla.org/projects/bonecho/anti-phishing/ (-1, , X, X- R/X/L) www.webcitation.org/5mq3wifwd?url=http%3A%2F%2Fblogs.msdn.com%2Fie%2Farchive%2F2005%2F11%2F21%2F495507.aspx (-1, -1, X, X- R/X/L) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1, , X, X- R/X/L) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (-1, , X, X- R/X/L) www.zdnetindia.com/news/features/stories/126569.html (-1, , X, X- R/X/L) www.webcitation.org/5w9ZCK7Pk?url=http%3A%2F%2Fwww2006.org%2Fprogramme%2Fitem.php%3Fid%3D3533 (-1, -1, X, X- R/X/L) www2006.org/programme/item.php?id=3533 (-1, , X, X- R/X/L) isc.incidents.org/diary.php?storyid=1194 (-1, , X, X- R/X/L) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (-1, , X, X- R/X/L) web.archive.org/web/20070306171850/http://www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (-1, -1, X, X- R/X/L) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (-1, , X, X- R/X/L) www.hexview.com/sdp/node/24 (-1, , X, X- R/X/L) web.archive.org/web/20080320035409/http://www.hexview.com/sdp/node/24 (-1, -1, X, X- R/X/L) www.comodo.com/resources/home/phishing-scams.php (-1, , X, X- R/X/L) online.wsj.com/public/article/0,,SB112424042313615131-z_8jLB2WkfcVtgdAWf6LRh733sg_20060817,00.html?mod=blogs (-1, , X, X- R/X/L) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1, , X, X- R/X/L) www.academia.edu/2390447/Designing_a_Mobile_Game_to_Teach_Conceptual_Knowledge_of_Avoiding_Phishing_Attacks (-1, , X, X- R/X/L) www.youtube.com/watch?v=fzXclG_c5Sk (-1, -1, X, X- R/X/L) www.fraudwatchinternational.com (-1, , X, X- R/X/L) www.webcitation.org/5QVOm5OO1?url=http%3A%2F%2Fwww.millersmiles.co.uk (-1, -1, X, X- R/X/L) www.millersmiles.co.uk (-1, , X, X- R/X/L) www.dw.com/en/divide-europe-european-lawmakers-warn-of-russian-propaganda/a-36016836 (-1, , X, X- R/X/L) www.europarl.europa.eu/pdfs/news/expert/infopress/20161118IPR51718/20161118IPR51718_en.pdf (-1, , X, X- R/X/L) motherboard.vice.com/read/russian-hackers-launch-targeted-cyberattacks-hours-after-trumps-win (-1, , X, X- R/X/L) arstechnica.com/security/2016/10/researchers-find-fake-data-in-olympic-anti-doping-guccifer-2-0-clinton-dumps/ (-1, , X, X- R/X/L) www.bbc.co.uk/newsbeat/article/37374053/what-we-know-about-fancy-bears-hack-team (-1, , X, X- R/X/L) www.ibtimes.co.uk/russian-hackers-fancy-bear-likely-breached-olympic-drug-testing-agency-dnc-experts-say-1577508 (-1, , X, X- R/X/L) www.faz.net/aktuell/politik/inland/hackerangriffe-auf-politiker-wir-haben-fingerabdruecke-14445655.html (-1, , X, X- R/X/L) www.heise.de/newsticker/meldung/Angeblich-versuchter-Hackerangriff-auf-Bundestag-und-Parteien-3328265.html (-1, , X, X- R/X/L) www.sueddeutsche.de/politik/bundesregierung-ist-alarmiert-hackerangriff-aufdeutsche-parteien-1.3170347 (-1, , X, X- R/X/L) www.dw.com/en/hackers-lurking-parliamentarians-told/a-19564630 (-1, , X, X- R/X/L) www.kansas.com/news/local/crime/article88960532.html (-1, , X, X- R/X/L) www.economist.com/news/united-states/21707574-whats-worse-being-attacked-russian-hacker-being-attacked-two-bear-bear (-1, , X, X- R/X/L) www.nytimes.com/2016/06/15/us/politics/russian-hackers-dnc-trump.html (-1, , X, X- R/X/L) www.eff.org/deeplinks/2015/08/new-spear-phishing-campaign-pretends-be-eff (-1, , X, X- R/X/L) boingboing.net/2015/08/28/spear-phishers-with-suspected.html?utm_source=moreatbb&utm_medium=nextpost&utm_campaign=nextpostthumbnails (-1, , X, X- R/X/L) edition.cnn.com/2015/08/05/politics/joint-staff-email-hack-vulnerability/ (-1, , X, X- R/X/L) www.cnbc.com/2015/08/06/russia-hacks-pentagon-computers-nbc-citing-sources.html (-1, , X, X- R/X/L) www.threatconnect.com/blog/russia-hacks-bellingcat-mh17-investigation/ (-1, , X, X- R/X/L) www.washingtonpost.com/world/national-security/russian-hackers-harass-researchers-who-documented-russian-involvement-in-shootdown-of-malaysian-jetliner-over-ukraine-in-2014/2016/09/28/d086c8bc-84f7-11e6-ac72-a29979381495_story.html (-1, , X, X- R/X/L) www.justice.gov/opa/pr/former-us-nuclear-regulatory-commission-employee-pleads-guilty-attempted-spear-phishing-cyber (-1, , X, X- R/X/L) www.justice.gov/file/eccleston-indictment/download (-1, , X, X- R/X/L) www.justice.gov/file/eccleston-indictment/download (-1, , X, X- R/X/L) www.icann.org/news/announcement-2-2014-12-16-en (-1, , X, X- R/X/L) www.usatoday.com/story/money/business/2014/11/06/home-depot-hackers-stolen-data/18613167/ (-1, , X, X- R/X/L) techcrunch.com/2016/03/15/prosecutors-find-that-fappening-celebrity-nudes-leak-was-not-apples-fault/ (-1, , X, X- R/X/L) www.huffingtonpost.com/micah-d-halpern/cyber-breakin-idf_b_4696472.html (-1, , X, X- R/X/L) www.bloomberg.com/news/2014-01-27/israel-to-ease-cyber-security-export-curbs-premier-says.html (-1, , X, X- R/X/L) www.securityweek.com/israeli-defense-computer-hit-cyber-attack-data-expert (-1, , X, X- R/X/L) www.bbc.co.uk/news/technology-25575790 (-1, , X, X- R/X/L) www.theguardian.com/world/2014/jan/27/hackers-israeli-defence-ministry-computers (-1, , X, X- R/X/L) www.ynet.co.il/articles/0,7340,L-4481380,00.html (-1, , X, X- R/X/L) www.reuters.com/article/2014/01/26/israel-cybersecurity-idUSL5N0L00JR20140126?irpc=932&irpc=932 (-1, -1, X, X- R/X/L) www.bbc.com/news/technology-25506020 (-1, , X, X- R/X/L) www.emailanswers.com/2013/10/phishing-emails-unacceptable-failures-american-express/ (-1, , X, X- R/X/L) www.theatlanticwire.com/global/2013/08/syrian-hackers-use-outbrain-target-washington-post-time-and-cnn/68370/ (-1, , X, X- R/X/L) 247wallst.com/retail/2014/05/05/target-ceo-sacked/ (-1, , X, X- R/X/L) bringmethenews.com/2014/02/12/report-email-phishing-scam-led-to-target-breach/ (-1, , X, X- R/X/L) www.dodbuzz.com/2011/08/22/report-chinese-tv-doc-reveals-cyber-mischief/ (-1, , X, X- R/X/L) www.computerworld.com/s/article/9219155/Suspected_Chinese_spear_phishing_attacks_continue_to_hit_Gmail_users (-1, , X, X- R/X/L) www.nytimes.com/2011/05/28/business/28hack.html (-1, , X, X- R/X/L) blogs.rsa.com/anatomy-of-an-attack/ (-1, , X, X- R/X/L) www.antiphishing.org/resources/apwg-reports/ (-1, , X, X- R/X/L) apwg.org/reports/apwg_report_Q3_2009.pdf (-1, 999999999, X, X- R/X/L) rapidshare.de/en/phishing.html (-1, , X, X- R/X/L) web.archive.org/web/20080430101024/http://rapidshare.de/en/phishing.html (-1, -1, X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (-1, , X, X- R/X/L) www.webcitation.org/5gY2R1j1g?url=http%3A%2F%2Fwww.sophos.com%2Fpressoffice%2Fnews%2Farticles%2F2007%2F09%2Fameritrade.html (-1, -1, X, X- R/X/L) research.microsoft.com/~cormac/Papers/PhishingAsTragedy.pdf (-1, -1, X, X- R/X/L) www.gartner.com/it/page.jsp?id=565125 (-1, , X, X- R/X/L) dx.doi.org/10.1145/1290958.1290968 (-1, , X, X- R/X/L) www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (-1, , X, X- R/X/L) web.archive.org/web/20061205104430/http://www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (-1, -1, X, X- R/X/L) www.pcworld.com/resource/article/0,aid,125956,pg,1,RSS,RSS,00.asp (-1, , X, X- R/X/L) www.browser-recon.info (-1, , X, X- R/X/L) www.webcitation.org/5w9YXj9AJ?url=http%3A%2F%2Fwww.irs.gov%2Fnewsroom%2Farticle%2F0%2C%2Cid%3D155682%2C00.html (-1, -1, X, X- R/X/L) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1, , X, X- R/X/L) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1, , X, X- R/X/L) web.archive.org/web/20081028225500/http://www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1, -1, X, X- R/X/L) applications.boi.com/updates/Article?PR_ID=1430 (-1, , X, X- R/X/L) web.archive.org/web/20081007194413/http://applications.boi.com/updates/Article?PR_ID=1430 (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (-1, , X, X- R/X/L) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=15013 (-1, , X, X- R/X/L) firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1272/1192 (-1, , X, X- R/X/L) www.webcitation.org/5w9YVyMYn?url=http%3A%2F%2Fitmanagement.earthweb.com%2Fsecu%2Farticle.php%2F3451501 (-1, -1, X, X- R/X/L) itmanagement.earthweb.com/secu/article.php/3451501 (-1, , X, X- R/X/L) www.csoonline.com/talkback/071905.html (-1, , X, X- R/X/L) web.archive.org/web/20080324080028/http://www.csoonline.com/talkback/071905.html (-1, -1, X, X- R/X/L) financialcryptography.com/mt/archives/000609.html (-1, , X, X- R/X/L) www.webcitation.org/5w9YV2fuL?url=http%3A%2F%2Fwww.rajuabju.com%2Fwarezirc%2Fhistoryofaolwarez.htm (-1, -1, X, X- R/X/L) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1, , X, X- R/X/L) www.wordspy.com/words/phishing.asp (-1, , X, X- R/X/L) www.phishing.org/history-of-phishing/ (-1, , X, X- R/X/L) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  18. 2017-05-09 13:30:30 (UTC): User ClueBot NG t • c • dc • l • ef • b • bl; (-1) to Phishing (edit | talk | history | links | watch | logs) (diff  !top) - Link: www.phishtank.com (R/Xmeta/L- still there)
    Other links: informationweek.com/story/showArticle.jhtml?articleID=60404811 (-1, , X, X- R/X/L) www.webcitation.org/5w9ZIR3zi?url=http%3A%2F%2Fwww.sophos.com%2Fpressoffice%2Fnews%2Farticles%2F2006%2F11%2Fphishing-arrests.html (-1, -1, X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2006/11/phishing-arrests.html (-1, , X, X- R/X/L) www.justice.gov/archive/opa/pr/2004/October/04_crm_726.htm (-1, , X, X- R/X/L) www.eweek.com/article2/0%2C1895%2C1831960%2C00.asp (-1, , X, X- R/X/L) www.channelregister.co.uk/2005/03/21/brazil_phishing_arrest/ (-1, , X, X- R/X/L) www.cnn.com/2003/TECH/internet/07/21/phishing.scam/index.html (-1, , X, X- R/X/L) www.forbes.com/sites/josephsteinberg/2014/08/25/why-you-are-at-risk-of-phishing-attacks-and-why-jp-morgan-chase-customers-were-targeted-this-week/ (-1, , X, X- R/X/L) www.safesigner.com (-1, , X, X- R/X/L) consumerscams.org/scam_safety_tips/how_to_report_phishing_scam (-1, , X, X- R/X/L) www.google.com/safebrowsing/report_phish/ (-1, , X, X- R/X/L) www.ftc.gov/phonefraud (-1, , X, X- R/X/L) www.webcitation.org/5w9ZHYbnJ?url=http%3A%2F%2Fwww.schneier.com%2Fblog%2Farchives%2F2006%2F10%2Fphishtank.html (-1, -1, X, X- R/X/L) www.schneier.com/blog/archives/2006/10/phishtank.html (-1, , X, X- R/X/L) www.linuxworld.com.au/index.php/id;1075406575;fp;2;fpid;1. (-1, , X, X- R/X/L) www.webcitation.org/5w9ZGndsq?url=http%3A%2F%2Fwww.antiphishing.org%2Fsolutions.html%23takedown (-1, -1, X, X- R/X/L) www.antiphishing.org/solutions.html#takedown (-1, , X, X- R/X/L) reports-archive.adm.cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf (-1, , X, X- R/X/L) www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080216101637/http://www.albany.edu/iasymposium/2006/chandrasekaran.pdf (-1, -1, X, X- R/X/L) www.sciencedirect.com/science/article/pii/S1568494611002547 (-1, , X, X- R/X/L) www.inf.ufpr.br/lesoliveira/download/ASOC2011.pdf (-1, , X, X- R/X/L) www.confidenttechnologies.com/products/anti-phishing (-1, , X, X- R/X/L) people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1, , X, X- R/X/L) web.archive.org/web/20070629113158/http://people.deas.harvard.edu/~rachna/papers/securityskins.pdf (-1, -1, X, X- R/X/L) www.schneier.com/blog/archives/2005/07/security_skins.html (-1, , X, X- R/X/L) www.ovum.com/news/euronews.asp?id=4166 (-1, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html (-1, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=14384 (-1, , X, X- R/X/L) www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1, , X, X- R/X/L) web.archive.org/web/20080720092117/http://www.deas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf (-1, -1, X, X- R/X/L) www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600&en=295ec5d0994b0755&ei=5090&partner=rssuserland&emc=rss (-1, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/article/2005/07/13/AR2005071302181.html (-1, , X, X- R/X/L) www.webcitation.org/619zhkpkk?url=http%3A%2F%2Fwww.bankofamerica.com%2Fprivacy%2Fsitekey%2F (-1, -1, X, X- R/X/L) www.bankofamerica.com (-1, , X, X- R/X/L) www.eweek.com/article2/0,1759,1630161,00.asp (-1, , X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/08/using_images_to_fight_phishing.html (-1, , X, X- R/X/L) www.webcitation.org/612DwHoBd?url=http://www.darkreading.com/document.asp?doc_id%3D99089%26WT.svl%3Dnews1_1 (-1, -1, X, X- R/X/L) www.darkreading.com/document.asp?doc_id=99089&WT.svl=news1_1 (-1, , X, X- R/X/L) www.webcitation.org/5w9ZE56Uy?url=http%3A%2F%2Fwww.mozilla.org%2Fsecurity%2Fphishing-test.html (-1, -1, X, X- R/X/L) www.mozilla.org/security/phishing-test.html (-1, , X, X- R/X/L) www.oreillynet.com/onlamp/blog/2005/12/two_things_that_bother_me_abou.html (-1, , X, X- R/X/L) www.3sharp.com/projects/antiphish/index.htm (-1, , X, X- R/X/L) archive.is/20080114211315/http://www.3sharp.com/projects/antiphish/index.htm (-1, -1, X, X- R/X/L) www.webcitation.org/619zh5NCV?url=http%3A%2F%2Farstechnica.com%2Fjournals%2Fapple.ars%2F2008%2F11%2F13%2Fsafari-3-2-finally-gains-phishing-protection (-1, -1, X, X- R/X/L) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (-1, , X, X- R/X/L) www.webcitation.org/619zgMPR6?url=http%3A%2F%2Fwww.mozilla.org%2Fprojects%2Fbonecho%2Fanti-phishing%2F (-1, -1, X, X- R/X/L) www.mozilla.org/projects/bonecho/anti-phishing/ (-1, , X, X- R/X/L) www.webcitation.org/5mq3wifwd?url=http%3A%2F%2Fblogs.msdn.com%2Fie%2Farchive%2F2005%2F11%2F21%2F495507.aspx (-1, -1, X, X- R/X/L) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (-1, , X, X- R/X/L) blog.anta.net/2008/11/09/social-networking-site-teaches-insecure-password-practices/ (-1, , X, X- R/X/L) www.zdnetindia.com/news/features/stories/126569.html (-1, , X, X- R/X/L) www.webcitation.org/5w9ZCK7Pk?url=http%3A%2F%2Fwww2006.org%2Fprogramme%2Fitem.php%3Fid%3D3533 (-1, -1, X, X- R/X/L) www2006.org/programme/item.php?id=3533 (-1, , X, X- R/X/L) isc.incidents.org/diary.php?storyid=1194 (-1, , X, X- R/X/L) www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (-1, , X, X- R/X/L) web.archive.org/web/20070306171850/http://www.informatics.indiana.edu/markus/papers/trust_USEC.pdf (-1, -1, X, X- R/X/L) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (-1, , X, X- R/X/L) www.hexview.com/sdp/node/24 (-1, , X, X- R/X/L) web.archive.org/web/20080320035409/http://www.hexview.com/sdp/node/24 (-1, -1, X, X- R/X/L) www.comodo.com/resources/home/phishing-scams.php (-1, , X, X- R/X/L) online.wsj.com/public/article/0,,SB112424042313615131-z_8jLB2WkfcVtgdAWf6LRh733sg_20060817,00.html?mod=blogs (-1, , X, X- R/X/L) www.cylab.cmu.edu/files/cmucylab06017.pdf (-1, , X, X- R/X/L) www.academia.edu/2390447/Designing_a_Mobile_Game_to_Teach_Conceptual_Knowledge_of_Avoiding_Phishing_Attacks (-1, , X, X- R/X/L) www.youtube.com/watch?v=fzXclG_c5Sk (-1, -1, X, X- R/X/L) www.fraudwatchinternational.com (-1, , X, X- R/X/L) www.webcitation.org/5QVOm5OO1?url=http%3A%2F%2Fwww.millersmiles.co.uk (-1, -1, X, X- R/X/L) www.millersmiles.co.uk (-1, , X, X- R/X/L) www.dw.com/en/divide-europe-european-lawmakers-warn-of-russian-propaganda/a-36016836 (-1, , X, X- R/X/L) www.europarl.europa.eu/pdfs/news/expert/infopress/20161118IPR51718/20161118IPR51718_en.pdf (-1, , X, X- R/X/L) motherboard.vice.com/read/russian-hackers-launch-targeted-cyberattacks-hours-after-trumps-win (-1, , X, X- R/X/L) arstechnica.com/security/2016/10/researchers-find-fake-data-in-olympic-anti-doping-guccifer-2-0-clinton-dumps/ (-1, , X, X- R/X/L) www.bbc.co.uk/newsbeat/article/37374053/what-we-know-about-fancy-bears-hack-team (-1, , X, X- R/X/L) www.ibtimes.co.uk/russian-hackers-fancy-bear-likely-breached-olympic-drug-testing-agency-dnc-experts-say-1577508 (-1, , X, X- R/X/L) www.faz.net/aktuell/politik/inland/hackerangriffe-auf-politiker-wir-haben-fingerabdruecke-14445655.html (-1, , X, X- R/X/L) www.heise.de/newsticker/meldung/Angeblich-versuchter-Hackerangriff-auf-Bundestag-und-Parteien-3328265.html (-1, , X, X- R/X/L) www.sueddeutsche.de/politik/bundesregierung-ist-alarmiert-hackerangriff-aufdeutsche-parteien-1.3170347 (-1, , X, X- R/X/L) www.dw.com/en/hackers-lurking-parliamentarians-told/a-19564630 (-1, , X, X- R/X/L) www.kansas.com/news/local/crime/article88960532.html (-1, , X, X- R/X/L) www.economist.com/news/united-states/21707574-whats-worse-being-attacked-russian-hacker-being-attacked-two-bear-bear (-1, , X, X- R/X/L) www.nytimes.com/2016/06/15/us/politics/russian-hackers-dnc-trump.html (-1, , X, X- R/X/L) www.eff.org/deeplinks/2015/08/new-spear-phishing-campaign-pretends-be-eff (-1, , X, X- R/X/L) boingboing.net/2015/08/28/spear-phishers-with-suspected.html?utm_source=moreatbb&utm_medium=nextpost&utm_campaign=nextpostthumbnails (-1, , X, X- R/X/L) edition.cnn.com/2015/08/05/politics/joint-staff-email-hack-vulnerability/ (-1, , X, X- R/X/L) www.cnbc.com/2015/08/06/russia-hacks-pentagon-computers-nbc-citing-sources.html (-1, , X, X- R/X/L) www.threatconnect.com/blog/russia-hacks-bellingcat-mh17-investigation/ (-1, , X, X- R/X/L) www.washingtonpost.com/world/national-security/russian-hackers-harass-researchers-who-documented-russian-involvement-in-shootdown-of-malaysian-jetliner-over-ukraine-in-2014/2016/09/28/d086c8bc-84f7-11e6-ac72-a29979381495_story.html (-1, , X, X- R/X/L) www.justice.gov/opa/pr/former-us-nuclear-regulatory-commission-employee-pleads-guilty-attempted-spear-phishing-cyber (-1, , X, X- R/X/L) www.justice.gov/file/eccleston-indictment/download (-1, , X, X- R/X/L) www.justice.gov/file/eccleston-indictment/download (-1, , X, X- R/X/L) www.icann.org/news/announcement-2-2014-12-16-en (-1, , X, X- R/X/L) www.usatoday.com/story/money/business/2014/11/06/home-depot-hackers-stolen-data/18613167/ (-1, , X, X- R/X/L) techcrunch.com/2016/03/15/prosecutors-find-that-fappening-celebrity-nudes-leak-was-not-apples-fault/ (-1, , X, X- R/X/L) www.huffingtonpost.com/micah-d-halpern/cyber-breakin-idf_b_4696472.html (-1, , X, X- R/X/L) www.bloomberg.com/news/2014-01-27/israel-to-ease-cyber-security-export-curbs-premier-says.html (-1, , X, X- R/X/L) www.securityweek.com/israeli-defense-computer-hit-cyber-attack-data-expert (-1, , X, X- R/X/L) www.bbc.co.uk/news/technology-25575790 (-1, , X, X- R/X/L) www.theguardian.com/world/2014/jan/27/hackers-israeli-defence-ministry-computers (-1, , X, X- R/X/L) www.ynet.co.il/articles/0,7340,L-4481380,00.html (-1, , X, X- R/X/L) www.reuters.com/article/2014/01/26/israel-cybersecurity-idUSL5N0L00JR20140126?irpc=932&irpc=932 (-1, -1, X, X- R/X/L) www.bbc.com/news/technology-25506020 (-1, , X, X- R/X/L) www.emailanswers.com/2013/10/phishing-emails-unacceptable-failures-american-express/ (-1, , X, X- R/X/L) www.theatlanticwire.com/global/2013/08/syrian-hackers-use-outbrain-target-washington-post-time-and-cnn/68370/ (-1, , X, X- R/X/L) 247wallst.com/retail/2014/05/05/target-ceo-sacked/ (-1, , X, X- R/X/L) bringmethenews.com/2014/02/12/report-email-phishing-scam-led-to-target-breach/ (-1, , X, X- R/X/L) www.dodbuzz.com/2011/08/22/report-chinese-tv-doc-reveals-cyber-mischief/ (-1, , X, X- R/X/L) www.computerworld.com/s/article/9219155/Suspected_Chinese_spear_phishing_attacks_continue_to_hit_Gmail_users (-1, , X, X- R/X/L) www.nytimes.com/2011/05/28/business/28hack.html (-1, , X, X- R/X/L) blogs.rsa.com/anatomy-of-an-attack/ (-1, , X, X- R/X/L) www.antiphishing.org/resources/apwg-reports/ (-1, , X, X- R/X/L) apwg.org/reports/apwg_report_Q3_2009.pdf (-1, 999999999, X, X- R/X/L) rapidshare.de/en/phishing.html (-1, , X, X- R/X/L) web.archive.org/web/20080430101024/http://rapidshare.de/en/phishing.html (-1, -1, X, X- R/X/L) www.sophos.com/pressoffice/news/articles/2007/09/ameritrade.html (-1, , X, X- R/X/L) www.webcitation.org/5gY2R1j1g?url=http%3A%2F%2Fwww.sophos.com%2Fpressoffice%2Fnews%2Farticles%2F2007%2F09%2Fameritrade.html (-1, -1, X, X- R/X/L) research.microsoft.com/~cormac/Papers/PhishingAsTragedy.pdf (-1, -1, X, X- R/X/L) www.gartner.com/it/page.jsp?id=565125 (-1, , X, X- R/X/L) dx.doi.org/10.1145/1290958.1290968 (-1, , X, X- R/X/L) www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (-1, , X, X- R/X/L) web.archive.org/web/20061205104430/http://www.websense.com/securitylabs/alerts/alert.php?AlertID=708 (-1, -1, X, X- R/X/L) www.pcworld.com/resource/article/0,aid,125956,pg,1,RSS,RSS,00.asp (-1, , X, X- R/X/L) www.browser-recon.info (-1, , X, X- R/X/L) www.webcitation.org/5w9YXj9AJ?url=http%3A%2F%2Fwww.irs.gov%2Fnewsroom%2Farticle%2F0%2C%2Cid%3D155682%2C00.html (-1, -1, X, X- R/X/L) www.irs.gov/newsroom/article/0,,id=155682,00.html (-1, , X, X- R/X/L) www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1, , X, X- R/X/L) web.archive.org/web/20081028225500/http://www.vnunet.com/vnunet/news/2163714/bank-ireland-backtracks (-1, -1, X, X- R/X/L) applications.boi.com/updates/Article?PR_ID=1430 (-1, , X, X- R/X/L) web.archive.org/web/20081007194413/http://applications.boi.com/updates/Article?PR_ID=1430 (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2006/09/13/bank_customers_spar_over_phishing_losses.html (-1, , X, X- R/X/L) www.washingtonpost.com/wp-dyn/content/story/2007/10/12/ST2007101202661.html?hpid=topnews (-1, , X, X- R/X/L) www.theregister.co.uk/2005/05/03/aol_phishing/ (-1, , X, X- R/X/L) www.finextra.com/fullstory.asp?id=15013 (-1, , X, X- R/X/L) firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1272/1192 (-1, , X, X- R/X/L) www.webcitation.org/5w9YVyMYn?url=http%3A%2F%2Fitmanagement.earthweb.com%2Fsecu%2Farticle.php%2F3451501 (-1, -1, X, X- R/X/L) itmanagement.earthweb.com/secu/article.php/3451501 (-1, , X, X- R/X/L) www.csoonline.com/talkback/071905.html (-1, , X, X- R/X/L) web.archive.org/web/20080324080028/http://www.csoonline.com/talkback/071905.html (-1, -1, X, X- R/X/L) financialcryptography.com/mt/archives/000609.html (-1, , X, X- R/X/L) www.webcitation.org/5w9YV2fuL?url=http%3A%2F%2Fwww.rajuabju.com%2Fwarezirc%2Fhistoryofaolwarez.htm (-1, -1, X, X- R/X/L) www.rajuabju.com/warezirc/historyofaolwarez.htm (-1, , X, X- R/X/L) www.wordspy.com/words/phishing.asp (-1, , X, X- R/X/L) www.phishing.org/history-of-phishing/ (-1, , X, X- R/X/L) wired-vig.wired.com/news/technology/0,1282,9932,00.html (-1, , X, X- R/X/L) simson.net/clips/1995/95.SJMN.AOL_Hackers.html (-1, , X, X- R/X/L) www.bizjournals.com/atlanta/stories/2002/07/22/story4.html?page=all (-1, , X, X- R/X/L) www.met.police.uk/fraudalert/docs/internet_bank_fraud.pdf (-1, , X, X- R/X/L) www.webcitation.org/5ndG8erWg?url=http%3A%2F%2Fwww.met.police.uk%2Ffraudalert%2Fdocs%2Finternet_bank_fraud.pdf (-1, -1, X, X- R/X/L) www.belvoircreditunion.org/system/files/336/original/PhishinMembers.pdf (-1, , X, X- R/X/L) www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1, , X, X- R/X/L) web.archive.org/web/20050324073507/http://www.silicon.com/research/specialreports/voip/0,3800004463,39128854,00.htm (-1, -1, X, X- R/X/L) www.techweb.com/wire/security/186701001 (-1, , X, X- R/X/L) www.archersecuritygroup.com/fake-news-can-poison-computer-well-mind/ (-1, , X, X- R/X/L) www.chicagotribune.com/bluesky/originals/ct-gmail-phishing-attack-uiuc-bsi-20170119-story.html (-1, , X, X- R/X/L) www.symantec.com/connect/blogs/covert-redirect-flaw-oauth-not-next-heartbleed (-1, , X, X- R/X/L) www.scmagazine.com/covert-redirect-vulnerability-impacts-oauth-20-openid/article/345407/ (-1, , X, X- R/X/L) news.yahoo.com/facebook-google-users-threatened-security-192547549.html (-1, , X, X- R/X/L) thehackernews.com/2014/05/nasty-covert-redirect-vulnerability.html (-1, , X, X- R/X/L) www.foxnews.com/tech/2014/05/05/facebook-google-users-threatened-by-new-security-flaw/ (-1, , X, X- R/X/L) www.tomsguide.com/us/facebook-google-covert-redirect-flaw,news-18726.html (-1, , X, X- R/X/L) tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html (-1, , X, X- R/X/L) www.cnet.com/news/serious-security-flaw-in-oauth-and-openid-discovered/ (-1, , X, X- R/X/L) www.webcitation.org/5w9Z7NfVB?url=http%3A%2F%2Fnews.netcraft.com%2Farchives%2F2007%2F01%2F15%2Fphishing_attacks_continue_to_grow_in_sophistication.html (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (-1, , X, X- R/X/L) www.eweek.com/article2/0,1895,2082039,00.asp (-1, , X, X- R/X/L) www.webcitation.org/5w9Z5zOVh?url=http%3A%2F%2Fnews.netcraft.com%2Farchives%2F2006%2F06%2F16%2Fpaypal_security_flaw_allows_identity_theft.html (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2006/06/16/paypal_security_flaw_allows_identity_theft.html (-1, , X, X- R/X/L) www.webcitation.org/5w9Z4mv7k?url=http%3A%2F%2Fblog.washingtonpost.com%2Fsecurityfix%2F2006%2F06%2Fflaws_in_financial_sites_aid_s.html (-1, -1, X, X- R/X/L) blog.washingtonpost.com/securityfix/2006/06/flaws_in_financial_sites_aid_s.html (-1, , X, X- R/X/L) news.bbc.co.uk/1/hi/technology/3608943.stm (-1, , X, X- R/X/L) www.webcitation.org/5w9Z2iACi?url=http%3A%2F%2Fwww.fraudwatchinternational.com%2Fphishing-fraud%2Fphishing-web-site-methods%2F (-1, -1, X, X- R/X/L) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (-1, , X, X- R/X/L) www.powershow.com/view1/1f004e-NzY0N/The_use_of_Optical_Character_Recognition_OCR_software_in_spam_filtering_powerpoint_ppt_presentation (-1, , X, X- R/X/L) www.webcitation.org/5w9YzPsN0?url=http%3A%2F%2Fnews.netcraft.com%2Farchives%2F2005%2F05%2F12%2Ffraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1, -1, X, X- R/X/L) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (-1, , X, X- R/X/L) www.thoughtcrime.org/software/sslstrip/. (-1, , X, X- R/X/L) www.theregister.co.uk/2007/12/12/phishing_redirection/ (-1, , X, X- R/X/L) q.queso.com/archives/001617 (-1, , X, X- R/X/L) www.theregister.co.uk/2006/08/15/barclays_phish_scam/ (-1, , X, X- R/X/L) www.cs.technion.ac.il/~gabr/papers/homograph_full.pdf (-1, , X, X- R/X/L) www.shmoo.com/idn/homograph.txt (-1, , X, X- R/X/L) www.hsbcusa.com/security/recognize_fraud.html (-1, , X, X- R/X/L) www.webcitation.org/6mfqUkatY?url=http://www.bustspammers.com/phishing_links.html (-1, -1, X, X- R/X/L) www.bustspammers.com/phishing_links.html (-1, , X, X- R/X/L) web.archive.org/web/20111018140959/http://netforbeginners.about.com:80/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (-1, -1, X, X- R/X/L) netforbeginners.about.com/od/scamsandidentitytheft/f/What-Is-Whaling-Spear-Phishing.htm (-1, , X, X- R/X/L) www.webcitation.org/5w9YcgvUb?url=http%3A%2F%2Fwww.theregister.co.uk%2F2008%2F04%2F16%2Fwhaling_expedition_continues%2F (-1, -1, X, X- R/X/L) www.theregister.co.uk/2008/04/16/whaling_expedition_continues/. (-1, , X, X- R/X/L) www.firmex.com/blog/spear-phishing-whos-getting-caught/ (-1, , X, X- R/X/L) www.microsoft.com/canada/athome/security/email/spear_phishing.mspx (-1, , X, X- R/X/L) www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf (-1, , X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html (-1, 469, X, X- R/X/L) isc.sans.org/diary.php?storyid=1905 (-1, 176, X, X- R/X/L) googleonlinesecurity.blogspot.jp/2012/01/landing-another-blow-against-email.html (-1, 469, X, X- R/X/L) news.biharprabha.com/2014/02/20-indians-are-victims-of-online-phishing-attacks-microsoft/ (-1, , X, X- R/X/L) books.google.com/books?id=I-9P1EkTkigC&pg=PA433 (-1, -1, X, X- R/X/L) www.yourbank.example.com (-1, , X, X- R/X/L) d-nb.info/gnd/7515821-8 (-1, -1, X, X- R/X/L) www.cl.cam.ac.uk/%7Ernc1/takedown.pdf (-1, -1, X, X- R/X/L) www.phishtank.com (-1, 70, X, X- R/X/L) research.microsoft.com/en-us/um/people/cormac/Papers/PhishingAsTragedy.pdf (-1, -1, X, X- R/X/L) www.honeynet.org/papers/phishing/ (-1, 309, X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (-1, 999999999, X, X- R/X/L) www.utica.edu/academic/institutes/cimip/ (-1, 999999999, X, X- R/X/L) www.AntiPhishing.org (-1, , X, X- R/X/L) www.informationweek.com/story/showArticle.jhtml?articleID=199903450 (-1, , X, X- R/X/L) www.theregister.co.uk/2007/06/13/aol_fraudster_jailed/ (-1, , X, X- R/X/L) www.theregister.co.uk/2007/01/17/aol_phishing_fraudster/ (-1, , X, X- R/X/L) www.pcmag.com/article2/0,1895,2085183,00.asp (-1, , X, X- R/X/L) www.earthlink.net/about/press/pr_phishersite/ (-1, , X, X- R/X/L) web.archive.org/web/20070705211932/http://www.earthlink.net/about/press/pr_phishersite/ (-1, -1, X, X- R/X/L) www.washingtonpost.com/wp-dyn/articles/A40578-2005Apr9.html (-1, , X, X- R/X/L) leg1.state.va.us/cgi-bin/legp504.exe?051+sum+HB2471 (-1, , X, X- R/X/L) media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1, , X, X- R/X/L) web.archive.org/web/20070131204118/http://media.aoltimewarner.com/media/newmedia/cb_press_view.cfm?release_num=55254535 (-1, -1, X, X- R/X/L) corp.aol.com/whoweare/history/2006.shtml (-1, , X, X- R/X/L) web.archive.org/web/20070522231137/http://www.corp.aol.com/whoweare/history/2006.shtml (-1, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/23/ms_anti-phishing_campaign_update/ (-1, , X, X- R/X/L) news.zdnet.co.uk/0,39020330,39258528,00.htm (-1, , X, X- R/X/L) www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1, , X, X- R/X/L) web.archive.org/web/20051103190357/http://www.microsoft.com/australia/presspass/news/pressreleases/cybercrime_31_3_05.aspx (-1, -1, X, X- R/X/L) www.theregister.co.uk/2006/11/14/fraud_act_outlaws_phishing/ (-1, , X, X- R/X/L) www.webcitation.org/61A2zw5D2?url=http%3A%2F%2Fwww.opsi.gov.uk%2FACTS%2Fen2006%2F2006en35.htm (-1, -1, X, X- R/X/L) www.opsi.gov.uk/ACTS/en2006/2006en35.htm (-1, , X, X- R/X/L)

    User is in trusted groups bot, rollbacker, reviewer on some wikis
  19. 2017-09-06 14:09:55 (UTC): w:hy:User:Techno-Freak (t - c; 1936) to w:hy:Ֆիշինգ (diff  !top) - Link: www.phishtank.com (R/Xmeta/L- still there)
    Other links: news.bbc.co.uk/1/hi/technology/3608943.stm (1936, , X, X- R/X/L) www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ (1936, , X, X- R/X/L) www.webcitation.org/5w9Z2iACi (1936, -1, X, X- R/X/L) www.kaspersky.ru/mail_defend?chapter=207367444 (1936, , X, X- R/X/L) www.webcitation.org/5w9Z1Urus (1936, -1, X, X- R/X/L) www.microsoft.com/rus/protect/yourself/email/spam.mspx (1936, , X, X- R/X/L) www.webcitation.org/5w9Z0lvJs (1936, -1, X, X- R/X/L) news.netcraft.com/archives/2005/05/12/fraudsters_seek_to_make_phishing_sites_undetectable_by_content_filters.html (1936, , X, X- R/X/L) www.webcitation.org/5w9YzPsN0 (1936, -1, X, X- R/X/L) bugzilla.mozilla.org/show_bug.cgi?id=232567 (1936, , X, X- R/X/L) support.microsoft.com/kb/834489 (1936, , X, X- R/X/L) www.webcitation.org/5w9YyELkO (1936, -1, X, X- R/X/L) www.w3.org/Addressing/rfc1738.txt (1936, , X, X- R/X/L) www.webcitation.org/5w9YxTwyr (1936, -1, X, X- R/X/L) www.itsec.ru/newstext.php?news_id=57224 (1936, , X, X- R/X/L) www.webcitation.org/5w9YvQ4eJ (1936, -1, X, X- R/X/L) www.itsec.ru/newstext.php?news_id=24180 (1936, , X, X- R/X/L) www.webcitation.org/5w9YtYbci (1936, -1, X, X- R/X/L) www.itsec.ru/newstext.php?news_id=39051 (1936, , X, X- R/X/L) www.webcitation.org/5w9YqxDzW (1936, -1, X, X- R/X/L) www.compulenta.ru/print/50558/ (1936, , X, X- R/X/L) www.webcitation.org/5w9Yq6VwU (1936, -1, X, X- R/X/L) www.indiana.edu/~phishing/social-network-experiment/phishing-preprint.pdf (1936, , X, X- R/X/L) www.webcitation.org/5w9YpKFkF (1936, -1, X, X- R/X/L) www.itsec.ru/newstext.php?news_id=49868 (1936, , X, X- R/X/L) www.webcitation.org/5w9Yn9mBj (1936, -1, X, X- R/X/L) www.rian.ru/society/20080516/107610576.html (1936, , X, X- R/X/L) www.webcitation.org/5w9YfvFNN (1936, -1, X, X- R/X/L) securitylabs.websense.com/content/Alerts/1319.aspx (1936, , X, X- R/X/L) www.indiana.edu/~phishing/browser-recon/ (1936, , X, X- R/X/L) www.irs.gov/newsroom/article/0,,id=155682,00.html (1936, , X, X- R/X/L) www.webcitation.org/5w9YXj9AJ (1936, -1, X, X- R/X/L) 11.mvd.ru/news/item/7195427 (1936, , X, X- R/X/L) financialcryptography.com/mt/archives/000609.html (1936, , X, X- R/X/L) www.rajuabju.com/warezirc/historyofaolwarez.htm (1936, , X, X- R/X/L) www.webcitation.org/5w9YV2fuL (1936, -1, X, X- R/X/L) www.wordspy.com/2003/08/phishing.html (1936, , X, X- R/X/L) www.webcitation.org/5w9YTyC3n (1936, -1, X, X- R/X/L) www.technicalinfo.net/papers/Phishing.html (1936, , X, X- R/X/L) www.webcitation.org/5w9YT7W5q (1936, -1, X, X- R/X/L) groups.google.com/group/alt.online-service.america-online (1936, , X, X- R/X/L) historyofscience.com/G2I/timeline/index.php?id=1682 (1936, , X, X- R/X/L) www.webcitation.org/619zYmPrj (1936, -1, X, X- R/X/L) itre.cis.upenn.edu/~myl/languagelog/archives/001477.html (1936, , X, X- R/X/L) www.webcitation.org/619zYJtAO (1936, -1, X, X- R/X/L) www.google.com@members.tripod.com (1936, , X, X- R/X/L) www.cl.cam.ac.uk/%7Ernc1/takedown.pdf (1936, -1, X, X- R/X/L) www.phishtank.com (1936, 70, X, X- R/X/L) research.microsoft.com/en-us/um/people/cormac/Papers/PhishingAsTragedy.pdf (1936, -1, X, X- R/X/L) www.honeynet.org/papers/phishing/ (1936, 309, X, X- R/X/L) www.law.duke.edu/journals/dltr/articles/2005dltr0006.html (1936, 999999999, X, X- R/X/L) www.utica.edu/academic/institutes/cimip/ (1936, 999999999, X, X- R/X/L) www.AntiPhishing.org (1936, , X, X- R/X/L) www.darkreading.com/document.asp?doc_id=99089&WT.svl=news1_1 (1936, , X, X- R/X/L) www.webcitation.org/612Dw4gv6 (1936, -1, X, X- R/X/L) www.mozilla.org/security/phishing-test.html (1936, , X, X- R/X/L) www.webcitation.org/5w9ZE56Uy (1936, -1, X, X- R/X/L) www.3sharp.com/projects/antiphish/index.htm (1936, , X, X- R/X/L) arstechnica.com/journals/apple.ars/2008/11/13/safari-3-2-finally-gains-phishing-protection (1936, , X, X- R/X/L) www.webcitation.org/619zgmFMD (1936, -1, X, X- R/X/L) www.mozilla.org/projects/bonecho/anti-phishing/ (1936, , X, X- R/X/L) www.webcitation.org/619zgBn1L (1936, -1, X, X- R/X/L) blogs.msdn.com/ie/archive/2005/11/21/495507.aspx (1936, , X, X- R/X/L) www.webcitation.org/619zezWdX (1936, -1, X, X- R/X/L) news.cnet.com/Antiphishing-group-casts-line-at-new-threats/2100-7349_3-5816919.html (1936, , X, X- R/X/L) www.webcitation.org/619zeF3Rx (1936, -1, X, X- R/X/L) www.paypal.com/us/cgi-bin/webscr?cmd=_vdc-security-spoof-outside (1936, , X, X- R/X/L) www.cylab.cmu.edu/files/cmucylab06017.pdf (1936, , X, X- R/X/L) www.webcitation.org/619zc2s5A (1936, -1, X, X- R/X/L) www.natwest.com/global/security/security-advice/common-scams/phishing-sms.ashx (1936, , X, X- R/X/L) www.webcitation.org/5w9ZATKVU (1936, -1, X, X- R/X/L) www.justaskgemalto.com/en/node/4801 (1936, , X, X- R/X/L) www.webcitation.org/619zb69DF (1936, -1, X, X- R/X/L) searchmobilecomputing.techtarget.com/news/article/0,289142,sid40_gci1214281,00.html (1936, , X, X- R/X/L) www.webcitation.org/619zaXEIH (1936, -1, X, X- R/X/L) fraudwar.blogspot.com/2009/06/trust-caller-id-become-crime-victim.html (1936, , X, X- R/X/L) www.webcitation.org/5w9Z9I8Pl (1936, -1, X, X- R/X/L) news.alibaba.com/article/detail/safe-trading/100073084-1-new-phishing-scam-uses-fake.html (1936, , X, X- R/X/L) www.webcitation.org/5w9Z8OcBB (1936, -1, X, X- R/X/L) www.icbtollfree.com/article_free.cfm?articleId=5926 (1936, , X, X- R/X/L) www.techweb.com/wire/security/186701001 (1936, , X, X- R/X/L) news.netcraft.com/archives/2007/01/15/phishing_attacks_continue_to_grow_in_sophistication.html (1936, , X, X- R/X/L) www.webcitation.org/5w9Z7NfVB (1936, -1, X, X- R/X/L)

User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary User:COIBot/EditSummary