Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Supplement      
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Overview  
 7     Countermeasures against SMS phishing attacks        
        7.1     Typical SMS phishing attack scenario 
        7.2     Recommendations for end users         
        7.3     Recommendations for service providers          
 8     Countermeasures against SMS smishing attacks       
        8.1     Smishing attack scenario         
        8.2     Recommendations for end users         
        8.3     Recommendations for service providers          
Bibliography