Results 31 to 40 of about 53,867 (205)

PHISHING

open access: yesinternational journal of engineering technology and management sciences, 2022
In the discipline of computer protection, phishing is the criminally fraudulent method of trying to gather sensitive statistics together with usernames, passwords and credit card information, by way of masquerading as a truthful entity in an digital attempting to accumulate touchy information which includes usernames, passwords and credit card ...
null Alphiya Yunoose   +4 more
openaire   +1 more source

SPWalk: Similar Property Oriented Feature Learning for Phishing Detection

open access: yesIEEE Access, 2020
Detecting phishing webpages is an essential task that protects legitimate websites and their users from various malicious activities. To classify the suspect webpage as phishing or legitimate, robust and effective features used for classification are in ...
Xiuwen Liu, Jianming Fu
doaj   +1 more source

Developing and evaluating a five minute phishing awareness video [PDF]

open access: yes, 2018
Confidence tricksters have always defrauded the unwary. The computer era has merely extended their range and made it possible for them to target anyone in the world who has an email address.
DD Caputo   +16 more
core   +3 more sources

Detecting phishing gangs via taint analysis on the Ethereum blockchain [PDF]

open access: yesBlockchain, 2023
Blockchain technology has created a new cryptocurrency world and attracted a lot of attention. It also attracts scams, for example, phishing scam, a typical fraud, has been found making a notable amount of money in the blockchain ecosystem, which has a ...
Kangrui Huang, Weili Chen, Zibin Zheng
doaj   +1 more source

Assessing the role of conceptual knowledge in an anti-phishing game [PDF]

open access: yes, 2014
Copyright @ 2014 IEEE. This is the author accepted version of this article.Games can be used to support learning and confidence development in several domains, including the secure use of computers.
Arachchilage, NAG, Ghinea, G, Scott, MJ
core   +1 more source

Plugging the “Phishing” Hole: Legislation Versus Technology [PDF]

open access: yes, 2005
This iBrief analyzes the Anti-Phishing Act of 2005, legislation aimed at curbing the problem of phishing. Phishing is the sending of fraudulent emails which appear to be from legitimate businesses and thereby fooling the recipients into divulging ...
Ekerstad, Niklas   +2 more
core   +2 more sources

The Phishing Master Anti-Phishing Game

open access: yes, 2022
Games are one type of measure developed to raise security awareness. We present the design of a anti-phishing game for public events or for public spaces. We collected feedback on the game and got an impression of individuals' interaction with the game, through a small user study with a convenience sample at a public event.
Dietmann, Heike   +8 more
openaire   +3 more sources

COVID-19 and Phishing: Effects of Human Emotions, Behavior, and Demographics on the Success of Phishing Attempts During the Pandemic

open access: yesIEEE Access, 2021
Phishing is an online scam where criminals trick users with various strategies, with the goal of obtaining sensitive information or compromising accounts, systems, and/or other personal or organisational Information Technology resources. Multiple studies
Hossein Abroshan   +3 more
doaj   +1 more source

Phishing-Inspector: Detection & Prevention of Phishing Websites [PDF]

open access: yesITM Web of Conferences, 2020
With a tremendous boost in technologies & available learning material developing any website has become very easy. Due to this the number of websites are exponentially growing day by day. The traditional approach of comparing websites with Blacklist and whitelist is not so efficient.
Doke Tanmay   +3 more
openaire   +2 more sources

Phishing Happens Beyond Technology: The Effects of Human Behaviors and Demographics on Each Step of a Phishing Process

open access: yesIEEE Access, 2021
Prior studies have shown that the behaviours and attitudes of Internet users influence the likelihood of being victimised by phishing attacks. Many scammers design a step-by-step approach to phishing in order to gain the potential victim’s trust ...
Hossein Abroshan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy