Results 101 to 110 of about 53,867 (205)
Phishing websites are cybercrimes that aim to collect confidential data, including bank card numbers, bank accounts, and credentials. To detect phishing sites, specialists must extract the elements of the websites and utilize third-party resources.
S. Senthil Kumar +2 more
doaj +1 more source
Phishing vulnerability and personality traits: Insights from a systematic review
Phishing attacks have gained prominence and effectiveness over the years. Although many efforts are devoted to combat them, generic anti-phishing awareness and training campaigns have shown limited success.
Pablo López-Aguilar +4 more
doaj +1 more source
Investigation of Phishing Susceptibility with Explainable Artificial Intelligence
Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective ...
Zhengyang Fan +3 more
doaj +1 more source
Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions [PDF]
Phishing has grown significantly in volume over the time, becoming the most usual web threat today. The present economic crisis is an added argument for the great increase in number of attempts to cheat internet users, both businesses and private ones ...
Alexandru TABUSCA, Ion LUNGU
core
With the fast development of the Internet of Things (IoTs), phishing attacks are transferring to this domain because of the number of IoT devices and private data they can handle.
Jawhara Aljabri +7 more
doaj +1 more source
The advent of the digital world does not always have positive impacts, it often poses serious attacks that can be highly detrimental to its users, one of which is phishing.
Dwi Wina Adani +2 more
doaj +1 more source
Phishing has become Indonesia's most prevalent cybercrime from 2017 to 2022, primarily due to the collection of users' personal information. The purpose of this study is to examine how security concerns are impacted by social engineering, internet ...
Rista Junita Nur’aini +1 more
doaj +1 more source
MeAJOR: Merged email assets from joint open-source repositories. [PDF]
Cardoso F +4 more
europepmc +1 more source
Real time identification of phishing attacks through machine learning enhanced browser extensions. [PDF]
Dandotiya M +3 more
europepmc +1 more source
BadDomains: Early Detection of Phishing Domains Registration. [PDF]
Seweryn K +2 more
europepmc +1 more source

