Results 11 to 20 of about 53,867 (205)
Heads-up! An alert and warning system for phishing emails [PDF]
Purpose – This study introduces the concept of audiovisual alerts and warnings as a way to reduce phishing susceptibility on mobile devices. Design/methodology/approach – This study has three phases.
Molly Cooper +3 more
doaj +1 more source
Phishing attacks are still seen as a significant threat to cyber security, and large parts of the industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This study conducted a large-scale anti-phishing training with more
Thomas Sutter +3 more
doaj +1 more source
Demystifying the Regional Phishing Landscape in South Korea
The ever-increasing phishing campaigns around the globe have been one of the main threats to cyber security. In response, the global anti-phishing entity (e. g., APWG) collectively maintains the up-to-date blacklist database (e.
Hyunjun Park +4 more
doaj +1 more source
Improving the phishing website detection using empirical analysis of Function Tree and its variants
The phishing attack is one of the most complex threats that have put internet users and legitimate web resource owners at risk. The recent rise in the number of phishing attacks has instilled distrust in legitimate internet users, making them feel less ...
Abdullateef O. Balogun +10 more
doaj +1 more source
Categorizing human phishing difficulty: a Phish Scale [PDF]
Abstract As organizations continue to invest in phishing awareness training programs, many chief information security officers (CISOs) are concerned when their training exercise click rates are high or variable, as they must justify training budgets to organization officials who question the efficacy of awareness training when click ...
Michelle Steves +2 more
openaire +1 more source
PhiDMA – A phishing detection model with multi-filter approach
Phishing remains a basic security issue in the cyberspace. In phishing, assailants steal sensitive information from victims by providing a fake site which looks like the visual clone of a legitimate site.
Gunikhan Sonowal, K.S. Kuppusamy
doaj +1 more source
Investigating the Effect of Phishing Believability on Phishing Reporting
Phishing emails are becoming more and more sophisticated, making current detection techniques ineffective. The reporting of phishing emails from users is, thus, crucial for organizations to detect phishing attacks and mitigate their effect. Despite extensive research on how the believability of a phishing email affects detection rates, there is little ...
Leon Kersten +3 more
openaire +2 more sources
E-mail-Based Phishing Attack Taxonomy
The amount of fraud on the Internet is increasing along with the availability and the popularity of the Internet around the world. One of the most common forms of Internet fraud is phishing.
Justinas Rastenis +5 more
doaj +1 more source
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet economy. Phishing attacks are now most often carried out by email.
Said Salloum +3 more
doaj +1 more source
People are increasingly sharing their personal information online as internet usage grows. As a result, fraudsters have access to a massive amount of personal information and financial activities.
Riyadh Rahef Nuiaa Al Ogaili +1 more
doaj +1 more source

