Knowledge (XXG)

Talk:Phishing

Source 📝

250: 502: 622: 273: 879: 745: 724: 829: 562: 535: 940: 220: 493: 439: 660: 506: 1206: 1176: 1196: 263: 166: 1226: 1211: 1171: 691: 372: 315: 391: 612: 279: 1221: 602: 1256: 211: 454: 578: 160: 1166: 803: 410: 92: 1251: 1191: 1236: 1216: 793: 636: 649: 569: 540: 334: 98: 1246: 1201: 769: 1181: 259: 43: 958: 473:. The original page is now a redirect to this page. For the contribution history and old versions of the redirected article, please see 1231: 1124: 891: 752: 729: 631: 545: 112: 353: 117: 33: 57: 249: 87: 1241: 1186: 515: 78: 1153:
Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.
450: 181: 948: 674: 148: 272: 1132: 1120: 219: 198: 902: 700:
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
262:. Please see the links under Article milestones below for its original nomination page (for older articles, check 122: 230: 976: 521: 207: 203: 833: 1006: 765: 142: 68: 1135:
article can become more detailed, especially as these types of events continue to occur in the future –
768:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
577:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
83: 138: 492: 466: 174: 1082: 1014: 984: 235: 188: 1140: 669: 574: 64: 232: 1114: 1027: 997: 878: 1119:
I propose that the contents of the History section be put onto a separate page called
967: 703:
Find editors who have shown interest in this subject and ask them to take a look here.
154: 1160: 1098: 1078: 621: 1136: 1106: 1102: 1036: 1110: 744: 723: 939: 561: 534: 761: 1128: 837: 757: 470: 37: 659: 1207:
Knowledge (XXG) level-5 vital articles in Society and social sciences
234: 1144: 1086: 934: 819: 486: 433: 236: 28: 15: 1197:
Knowledge (XXG) vital articles in Society and social sciences
658: 620: 1177:
Featured articles that have appeared on the main page once
1131:
article would then focus on types and prevention, and the
278:
This article appeared on Knowledge (XXG)'s Main Page as
1077:, which has been completed by proposer on 19 Feb 2023. 861: 855: 849: 843: 478: 474: 445: 403: 384: 365: 346: 327: 308: 1007:"Layton family falls victim to online 'phishing' scam" 173: 1227:
B-Class Computer Security articles of High-importance
1212:
B-Class vital articles in Society and social sciences
1172:
Featured articles that have appeared on the main page
977:"Fraudulent e-mails biggest threat to Internet users" 1067:
Subsequent comments should be made in a new section.
756:, a collaborative effort to improve the coverage of 573:, a collaborative effort to improve the coverage of 187: 681:Review importance and quality of existing articles 684:Identify categories related to Computer Security 46:for general discussion of the article's subject. 959:"New Phishing Law Could Net Offenders 5 Years" 1257:Knowledge (XXG) pages referenced by the press 1070:A summary of the conclusions reached follows. 968:"Microsoft Sues Phishers Over Identity Theft" 587:Knowledge (XXG):WikiProject Computer Security 8: 1222:High-importance Computer Security articles 886:Here are some tasks awaiting attention: 718: 690:Identify articles for creation (see also: 644: 529: 287: 244: 949:mentioned by multiple media organizations 672:. Please allow some days for processing. 1167:Knowledge (XXG) former featured articles 720: 531: 490: 1252:Knowledge (XXG) pages with to-do lists 1192:Knowledge (XXG) level-5 vital articles 1023: 1012: 993: 982: 590:Template:WikiProject Computer Security 778:Knowledge (XXG):WikiProject Computing 7: 1061:The following discussion is closed. 750:This article is within the scope of 567:This article is within the scope of 975:Jason Gretencord (June 22, 2005.). 520:It is of interest to the following 36:for discussing improvements to the 1237:High-importance Computing articles 1217:B-Class Computer Security articles 1125:List of security hacking incidents 957:Chris Richardson (March 3, 2005). 14: 697:Identify articles for improvement 63:New to Knowledge (XXG)? Welcome! 1149:The discussion above is closed. 1005:Lynn Wilde (January 23, 2006.). 938: 877: 827: 743: 722: 560: 533: 500: 491: 437: 271: 248: 218: 58:Click here to start a new topic. 1035:Newegg.com (November 8, 2006). 798:This article has been rated as 607:This article has been rated as 1247:All Computer Security articles 1202:B-Class level-5 vital articles 781:Template:WikiProject Computing 1: 1145:17:42, 31 December 2022 (UTC) 966:Loren Baker (April 2, 2005). 772:and see a list of open tasks. 668:will be generated shortly by 650:WikiProject Computer Security 629:This article is supported by 581:and see a list of open tasks. 570:WikiProject Computer Security 55:Put new text under old text. 1182:Old requests for peer review 1037:"October 2006 Phishing Scam" 1273: 1232:B-Class Computing articles 1133:List of phishing incidents 1121:List of phishing incidents 908:Social engineering section 804:project's importance scale 613:project's importance scale 593:Computer Security articles 373:Featured article candidate 316:Featured article candidate 797: 738: 643: 628: 606: 555: 528: 477:; for its talk page, see 420: 290: 286: 266:) and why it was removed. 93:Be welcoming to newcomers 22:Skip to table of contents 1151:Please do not modify it. 1087:22:12, 20 May 2023 (UTC) 1064:Please do not modify it. 970:. Search Engine Journal. 280:Today's featured article 21: 897:Secure browsing section 423:Former featured article 411:Featured article review 392:Featured article review 260:former featured article 1242:All Computing articles 1187:B-Class vital articles 1022:Check date values in: 992:Check date values in: 947:This article has been 766:information technology 663: 625: 264:the nomination archive 88:avoid personal attacks 1075:No objection to split 753:WikiProject Computing 662: 632:WikiProject Computing 624: 514:on Knowledge (XXG)'s 507:level-5 vital article 212:Auto-archiving period 113:Neutral point of view 979:. Indiana Statesman. 687:Tag related articles 648:Things you can help 465:. Its contents were 461:with a consensus to 118:No original research 1009:. The WSU Signpost. 675:More information... 1053:Splitting proposal 867:Updated 2010-04-28 784:Computing articles 664: 626: 516:content assessment 449:was nominated for 291:Article milestones 99:dispute resolution 60: 1048: 1047: 930: 929: 924: 923: 818: 817: 814: 813: 810: 809: 717: 716: 713: 712: 709: 708: 584:Computer Security 575:computer security 541:Computer Security 485: 484: 432: 431: 428: 427: 282:on June 21, 2008. 243: 242: 79:Assume good faith 56: 27: 26: 1264: 1118: 1066: 1040: 1031: 1025: 1020: 1018: 1010: 1001: 995: 990: 988: 980: 971: 962: 942: 935: 881: 874: 873: 868: 831: 830: 820: 786: 785: 782: 779: 776: 747: 740: 739: 734: 726: 719: 692:Article requests 677: 645: 595: 594: 591: 588: 585: 564: 557: 556: 551: 548: 537: 530: 513: 504: 503: 496: 495: 487: 441: 440: 434: 421:Current status: 406: 387: 368: 349: 330: 311: 288: 275: 252: 245: 237: 223: 222: 213: 192: 191: 177: 108:Article policies 29: 16: 1272: 1271: 1267: 1266: 1265: 1263: 1262: 1261: 1157: 1156: 1155: 1154: 1096: 1094: 1062: 1055: 1044: 1043: 1034: 1021: 1011: 1004: 991: 981: 974: 965: 956: 952: 926: 925: 920: 842: 828: 800:High-importance 783: 780: 777: 774: 773: 733:High‑importance 732: 678: 673: 637:High-importance 609:High-importance 592: 589: 586: 583: 582: 550:High‑importance 549: 543: 511: 501: 438: 402: 385:August 11, 2006 383: 366:August 24, 2005 364: 347:August 24, 2005 345: 326: 307: 239: 238: 233: 210: 134: 129: 128: 127: 104: 74: 12: 11: 5: 1270: 1268: 1260: 1259: 1254: 1249: 1244: 1239: 1234: 1229: 1224: 1219: 1214: 1209: 1204: 1199: 1194: 1189: 1184: 1179: 1174: 1169: 1159: 1158: 1148: 1093: 1092: 1091: 1090: 1089: 1057: 1056: 1054: 1051: 1046: 1045: 1042: 1041: 1032: 1002: 972: 963: 953: 946: 945: 943: 932: 928: 927: 922: 921: 919: 918: 909: 898: 885: 883: 882: 870: 825: 823: 816: 815: 812: 811: 808: 807: 796: 790: 789: 787: 770:the discussion 748: 736: 735: 727: 715: 714: 711: 710: 707: 706: 705: 704: 701: 698: 695: 688: 685: 682: 666:Article alerts 657: 654: 653: 641: 640: 627: 617: 616: 605: 599: 598: 596: 579:the discussion 565: 553: 552: 538: 526: 525: 519: 497: 483: 482: 457:was closed on 455:The discussion 446:Page hijacking 442: 430: 429: 426: 425: 418: 417: 414: 407: 404:April 23, 2009 399: 398: 395: 388: 380: 379: 376: 369: 361: 360: 357: 350: 342: 341: 338: 331: 323: 322: 319: 312: 304: 303: 300: 297: 293: 292: 284: 283: 276: 268: 267: 253: 241: 240: 231: 229: 228: 225: 224: 194: 193: 131: 130: 126: 125: 120: 115: 106: 105: 103: 102: 95: 90: 81: 75: 73: 72: 61: 52: 51: 48: 47: 41: 25: 24: 19: 13: 10: 9: 6: 4: 3: 2: 1269: 1258: 1255: 1253: 1250: 1248: 1245: 1243: 1240: 1238: 1235: 1233: 1230: 1228: 1225: 1223: 1220: 1218: 1215: 1213: 1210: 1208: 1205: 1203: 1200: 1198: 1195: 1193: 1190: 1188: 1185: 1183: 1180: 1178: 1175: 1173: 1170: 1168: 1165: 1164: 1162: 1152: 1147: 1146: 1142: 1138: 1134: 1130: 1126: 1123:, similar to 1122: 1116: 1112: 1108: 1104: 1100: 1088: 1084: 1080: 1076: 1073: 1072: 1071: 1068: 1065: 1059: 1058: 1052: 1050: 1038: 1033: 1029: 1016: 1008: 1003: 999: 986: 978: 973: 969: 964: 961:. WebProNews. 960: 955: 954: 950: 944: 941: 937: 936: 933: 917:Too much text 916: 914: 910: 907: 905: 904: 899: 896: 894: 893: 888: 887: 884: 880: 876: 875: 872: 869: 866: 863: 860: 857: 854: 851: 848: 845: 841: 839: 835: 824: 822: 821: 805: 801: 795: 792: 791: 788: 771: 767: 763: 759: 755: 754: 749: 746: 742: 741: 737: 731: 728: 725: 721: 702: 699: 696: 693: 689: 686: 683: 680: 679: 676: 671: 667: 661: 656: 655: 651: 647: 646: 642: 638: 635:(assessed as 634: 633: 623: 619: 618: 614: 610: 604: 601: 600: 597: 580: 576: 572: 571: 566: 563: 559: 558: 554: 547: 542: 539: 536: 532: 527: 523: 517: 509: 508: 498: 494: 489: 488: 480: 476: 472: 468: 464: 460: 456: 452: 448: 447: 443: 436: 435: 424: 419: 415: 413: 412: 408: 405: 401: 400: 396: 394: 393: 389: 386: 382: 381: 377: 375: 374: 370: 367: 363: 362: 358: 356: 355: 351: 348: 344: 343: 339: 337: 336: 332: 329: 328:June 20, 2005 325: 324: 320: 318: 317: 313: 310: 306: 305: 301: 298: 295: 294: 289: 285: 281: 277: 274: 270: 269: 265: 261: 257: 254: 251: 247: 246: 227: 226: 221: 217: 209: 205: 202: 200: 196: 195: 190: 186: 183: 180: 176: 172: 168: 165: 162: 159: 156: 153: 150: 147: 144: 140: 137: 136:Find sources: 133: 132: 124: 123:Verifiability 121: 119: 116: 114: 111: 110: 109: 100: 96: 94: 91: 89: 85: 82: 80: 77: 76: 70: 66: 65:Learn to edit 62: 59: 54: 53: 50: 49: 45: 39: 35: 31: 30: 23: 20: 18: 17: 1150: 1095: 1074: 1069: 1063: 1060: 1049: 931: 912: 911: 901: 900: 890: 889: 871: 864: 858: 852: 846: 832: 826: 799: 751: 665: 630: 608: 568: 522:WikiProjects 505: 462: 458: 444: 422: 409: 390: 371: 352: 333: 321:Not promoted 314: 309:May 25, 2005 255: 215: 197: 184: 178: 170: 163: 157: 151: 145: 135: 107: 32:This is the 475:its history 354:Peer review 335:Peer review 161:free images 44:not a forum 1161:Categories 1115:Mindmatrix 834:To-do list 459:2 May 2021 1039:. Newegg. 1015:cite news 985:cite news 775:Computing 762:computing 758:computers 730:Computing 670:AAlertBot 546:Computing 510:is rated 101:if needed 84:Be polite 34:talk page 1129:Phishing 1099:Bruce1ee 1079:Felix QW 838:Phishing 471:Phishing 451:deletion 378:Promoted 359:Reviewed 340:Reviewed 256:Phishing 216:365 days 199:Archives 69:get help 42:This is 40:article. 38:Phishing 1137:Kjerish 1113:, and 1107:Firefly 1103:MrOllie 862:refresh 850:history 802:on the 611:on the 512:B-class 416:Demoted 299:Process 167:WP refs 155:scholar 1127:. The 1111:Njd-de 1024:|date= 994:|date= 903:Verify 764:, and 518:scale. 467:merged 302:Result 139:Google 913:Other 856:watch 652:with: 499:This 469:into 463:merge 258:is a 182:JSTOR 143:books 97:Seek 1141:talk 1083:talk 1028:help 998:help 892:NPOV 844:edit 836:for 794:High 603:High 479:here 397:Kept 296:Date 175:FENS 149:news 86:and 453:. 189:TWL 1163:: 1143:) 1109:, 1105:, 1101:, 1085:) 1019:: 1017:}} 1013:{{ 989:: 987:}} 983:{{ 760:, 639:). 544:: 214:: 206:, 169:) 67:; 1139:( 1117:: 1097:@ 1081:( 1030:) 1026:( 1000:) 996:( 951:: 915:: 906:: 895:: 865:· 859:· 853:· 847:· 840:: 806:. 694:) 615:. 524:: 481:. 208:2 204:1 201:: 185:· 179:· 171:· 164:· 158:· 152:· 146:· 141:( 71:.

Index

Skip to table of contents
talk page
Phishing
not a forum
Click here to start a new topic.
Learn to edit
get help
Assume good faith
Be polite
avoid personal attacks
Be welcoming to newcomers
dispute resolution
Neutral point of view
No original research
Verifiability
Google
books
news
scholar
free images
WP refs
FENS
JSTOR
TWL
Archives
1
2

Former featured article
former featured article

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.