known phishing sites. Moreover, it is more likely
that iOS users are unaware that failing to
synchronize their device with iTunes lowers their
security while they browse the web.
In desktop browsers, despite the fact that the po-
pular web browsers included anti-phishing mecha-
nisms, their effectiveness varied significantly. Inter-
net Explorer offers the least protection from phish-
ing attacks, while Opera offers the highest level of
protection. Firefox and Chrome offered similar level
of protection.
The above mentioned findings can be more wor-
risome if one considers the proliferation of mobile
devices. We consider the lack of anti-phishing
mechanism on mobile browsers important due to the
impact of phishing attack to their users. We thus
suggest that all vendors of mobile browsers need to
implement protection mechanisms at least as
efficient as the ones offered by the desktop
browsers. This task is aided by the 'technological
convergence' of desktops and mobile devices, as the
latter devices gradually offer adequate resources for
anti-phishing protection (e.g. blacklist). In the mean-
time, users of mobile devices can be protected
against phishing attacks by installing the third-party
web browsers that offer phishing protection and/or
rely on filtering proxies.
For the future, we plan to further test the effecti-
veness of phishing blacklists that are provided by
mobile platforms. We also plan to investigate and
implement additional countermeasures that can be
used to combat phishing.
REFERENCES
Gartner, “Gartner Says Smartphone Sales Accounted for
55 Percent of Overall Mobile Phone Sales in 3
rd
Quar-
ter of 2013”. (Online). 2014 Available at:
https://www.gartner.com/newsroom/id/2623415
(Accessed: 10 Mar 2014).
Gartner, “Gartner Says Worldwide Mobile Payment
Transaction Value to Surpass $235 Billion in 2013”.
(Online). Available at: https://www.gartner.com/
newsroom/id/2504915 (Accessed: 10 Mar 2014).
Capaccio, N., “Apple Mobile Devices Cleared for Use on
U.S. Military Networks”. (Online). Available at:
http://www.bloomberg.com/news/2013-05-17/apple-
mobile-devices-cleared-for-use-on-u-s-military-
networks.html (Accessed: 10 Mar 2014).
CBC, “Smartphones becoming prime target for criminal
hackers”. (Online). Available at: http://www.cbc.ca/
news/technology/smartphones-becoming-prime-target-
for-criminal-hackers-1.2561126 (Accessed: 09 Apr
2014).
Mell, P., Kent, K., Nusbaum, J., “Guide to malware inci-
dent prevention and handling”, National Institute of
Standards and Technology (NIST), 2005.
Virvilis N., Gritzalis D., “Trusted Computing vs.
Advanced Persistent Threats: Can a defender win this
game?”, in Proc. of 10
th
IEEE International
Conference on Autonomic and Trusted Computing, pp.
396-403, IEEE Press, Italy, 2013.
Virvilis N., Gritzalis D., “The Big Four - What we did
wrong in Advanced Persistent Threat detection?”, in
Proc. of the 8
th
International Conference on
Availability, Reliability and Security, pp. 248-254,
IEEE, Germany, 2013.
Google, “Safe Browsing API”. (Online). Available at:
https://developers.google.com/safe-browsing/
(Accessed: 8 Mar 2014).
Microsoft, “SmartScreen Filter”. (Online). Available at:
http://windows.microsoft.com/en-us/internet-
explorer/products/ie-9/features/smartscreen-filter
(Accessed: 8 Mar 2014).
Netcraft, “Phishing Site Feed”. (Online). Available at:
http://www.netcraft.com/anti-phishing/phishing-site-
feed/ (Accessed: 8 Mar 2014).
PhishTank, “Join the fight against phishing”. (Online).
Available at: https://www.phishtank.com/ (Accessed:
8 Mar 2014).
Abrams R., Barrera O., and Pathak J., “Browser Security
Comparative Analysis”, NSS Labs, 2013. (Online).
Available: https://www.nsslabs.com/reports/browser-
security-comparative-analysis-phishing-protection
(Accessed: 2 Feb 2014).
Banu, M. Nazreen, S., Munawara Banu, “A Compre-
hensive Study of Phishing Attacks”, in Proc. of the In-
ternational Journal of Computer Science and
Information Technologies, vol. 4, issue 6, pp. 783-786,
2013.
Rosiello, A. P., Kirda, E., Kruegel, C., Ferrandi, F., “A
layout-similarity-based approach for detecting
phishing pages”, in Proc. of Security and Privacy in
Communications Networks Workshops, pp. 454-463,
2007.
Rani, S., Dubey, J., “A Survey on Phishing Attacks”,
International Journal of Computer Applications, vol.
88, issue 10, 2014.
Jansson, K., Von Solms, R., “Phishing for phishing awa-
reness”, in Proc. of Behavior & Information Technolo-
gy Conference, vol. 32, issue 6, pp. 584-593, 2013.
Bian R. M., “Alice in Battlefield: An Evaluation of the
Effectiveness of Various UI Phishing Warnings”.
(Online). Available: https://www.cs.auckland.ac.nz/
courses/compsci725s2c/archive/termpapers/725mbian
13.pdf (Accessed 2 Feb 2014)
Darwish A., Bataineh E., “Eye tracking analysis of
browser security indicators”, in Proc. of Computer
Systems and Industrial Informatics Conference, pp. 1–
6, 2012.
Akhawe D., Felt A. P., “Alice in Warningland: A large-
scale field study of browser security warning effecti-
veness”, in Proc. of the 22
nd
USENIX Security
Symposium, 2013.
SECRYPT2014-InternationalConferenceonSecurityandCryptography
86