Results 161 to 170 of about 53,867 (205)
Some of the next articles are maybe not open access.

Phishing for phishing awareness

Behaviour & Information Technology, 2013
Using various social-engineering techniques, criminals run havoc on the Internet and defraud many people in a number of different ways. This puts various organisational communities at risk. Therefore, it is important that people within such communities should learn how to protect themselves when active in cyberspace, or when dealing with cyber-related ...
K. Jansson, Rossouw von Solms
openaire   +1 more source

How persuasive is a phishing email? A phishing game for phishing awareness

Journal of Computer Security, 2019
Context: In the current era of digital technology, social engineers are using various tactics to undermine human weaknesses. Social Engineers target human psychology to achieve their target(s) which are in the form of data, account details, or IT devices etc. According to our research, one of the first methods social engineers used to target victims is
Rubia Fatima   +3 more
openaire   +1 more source

Social phishing

Communications of the ACM, 2007
Sometimes a "friendly" email message tempts recipients to reveal more online than they otherwise would, playing right into the sender's hand.
Tom N. Jagatic   +3 more
openaire   +1 more source

Scaling the Phish: Advancing the NIST Phish Scale

2021
Organizations use phishing training exercises to help employees defend against the phishing threats that get through automatic email filters, reducing potential compromise of information security and privacy for both the individual and their organization.
Fern Barrientos   +2 more
openaire   +1 more source

Phoiling phishing

Proceedings of the 15th international conference on World Wide Web, 2006
In the last few years, Internet users have seen the rapid expansion of "phishing", the use of spoofed e-mails and fraudulent websites designed to trick users into divulging sensitive data. More recently, we have seen the growth of "pharming", the use of malware or DNS-based attacks to misdirect users to rogue websites.
Rachna Dhamija   +3 more
openaire   +1 more source

One Phish, Two Phish, How to Avoid the Internet Phish

Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 2014
Phishing is a social engineering tactic that targets internet users in an attempt to trick them into divulging personal information. When opening an email, users are faced with the decision of determining if an email is legitimate or an attempt at phishing.
Olga A. Zielinska   +5 more
openaire   +1 more source

Pharewell to Phishing

2008
The conventional wisdom has always been that users should refrain from entering their sensitive data (such as usernames, passwords, and credit card numbers) into http(or white) pages, but they can enter these data into https (or yellow) pages. Unfortunately, this assumption is not valid as it became clear recently that, through human mistakes or ...
Taehwan Choi   +3 more
openaire   +1 more source

Phishing

2023
Phishing is a cybercrime in active growth that could cause several damages for its victims, such as identity theft. Specifically, in the last years, cybercrime has been of particular concern due to several attacks developed against society in general.
Liliana Queirós Ribeiro   +2 more
openaire   +3 more sources

Phorced to phish: benefits of a phishing equilibrium

Review of Behavioral Finance, 2018
Purpose A salesman calls up to offer you a “much” better phone plan. Before you know, you have changed to this new plan, which not only exceeds your needs, but also “procures” a six-month free subscription to an online music service. You needed neither and pay more: you have just been “phished” as Akerlof and Shiller would say in their recent book ...
D'Qrill, Nemo, Hendricks, Vincent Fella
openaire   +2 more sources

Phish Indicator: An Indication for Phishing Sites

2014
Phishing is a simple social engineering technique that functions by creating a fake Web site, often imitating a legitimate site. Despite many anti-phishing tools are developed, the phishing attacks are still a drift of trust in Internet security. In this paper, the indicator acts as an enhancement toward the usability of the cyber trust mechanisms ...
S. Aparna, Kandasamy Muniasamy
openaire   +1 more source

Home - About - Disclaimer - Privacy