Results 91 to 100 of about 50,838 (183)
Reaction to New Security Threat Class [PDF]
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: 1) they store employees and students sensitive data, 2) they save confidential documents, 3) their infrastructures often ...
Marco Casagrande +3 more
doaj
Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection
Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling.
Shakeel Ahmad +6 more
doaj +1 more source
Investigation of Attitudes Towards Security Behaviors [PDF]
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Internet Security Report stated that two out of the top three causes of data breaches in 2012 were attributable to human error (Pelgrin, 2014).
Kelley, Daniel
core +1 more source
Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions [PDF]
Phishing has grown significantly in volume over the time, becoming the most usual web threat today. The present economic crisis is an added argument for the great increase in number of attempts to cheat internet users, both businesses and private ones ...
Alexandru TABUSCA, Ion LUNGU
core
Phishing vulnerability and personality traits: Insights from a systematic review
Phishing attacks have gained prominence and effectiveness over the years. Although many efforts are devoted to combat them, generic anti-phishing awareness and training campaigns have shown limited success.
Pablo López-Aguilar +4 more
doaj +1 more source
Phishing websites are cybercrimes that aim to collect confidential data, including bank card numbers, bank accounts, and credentials. To detect phishing sites, specialists must extract the elements of the websites and utilize third-party resources.
S. Senthil Kumar +2 more
doaj +1 more source
With the fast development of the Internet of Things (IoTs), phishing attacks are transferring to this domain because of the number of IoT devices and private data they can handle.
Jawhara Aljabri +7 more
doaj +1 more source
Can Phishing Education Enable Users To Recognize Phishing Attacks?. [PDF]
Phishing attacks have increased rapidly and caused many drastic damages and losses for internet users‟ .The purpose of this research is to investigate on effectiveness of phishing education and training to help users identify different forms of phishing threats.
openaire +2 more sources
This study deals with the criminal scheme known as “Phishing”. In the first part of the study a technical analysis of Phishing serves to identify the operational variants of this scheme and the probable victims of this type of attack; in the second part, the scheme is legally decomposed, wi± the indication of the catalog of criminal offenses underlying
openaire +1 more source

