Results 111 to 120 of about 24,070 (256)

ByteBait USB: a robust simulation toolkit for badUSB phishing campaign

open access: yesJournal of King Saud University: Computer and Information Sciences
Phishing, a prevalent cybercrime using social engineering, threatens individuals and enterprises despite existing protections. This paper addresses BadUSB devices in phishing campaigns, which exploit inherent trust in USB devices to execute malicious ...
Wenhao Li   +5 more
doaj   +1 more source

The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia

open access: yesSoshum: Jurnal Sosial dan Humaniora
The advent of the digital world does not always have positive impacts, it often poses serious attacks that can be highly detrimental to its users, one of which is phishing.
Dwi Wina Adani   +2 more
doaj   +1 more source

Scam Pandemic: How Attackers Exploit Public Fear through Phishing [PDF]

open access: green, 2020
Marzieh Bitaab   +11 more
openalex   +1 more source

Detecting Phishing URLs Based on a Deep Learning Approach to Prevent Cyber-Attacks

open access: yesApplied Sciences
Phishing is one of the most widely observed types of internet cyber-attack, through which hundreds of clients using different internet services are targeted every day through different replicated websites.
Qazi Emad ul Haq   +2 more
doaj   +1 more source

Phishing 2.0: exploring the capabilities and risks of agentic AI-enabled attacks

open access: yesFrontiers in Computer Science
IntroductionPhishing attacks have evolved rapidly with the integration of artificial intelligence, posing serious threats to digital trust and cybersecurity.
Pankaj Chandre   +5 more
doaj   +1 more source

An Ontological Model of the Phishing Attack Process

open access: yes
Phishing attacks are common social engineering cyber attacks in which threat actors masquerade as reputable entities to mislead recipients into performing specific actions, such as revealing financial information, system login credentials, or installing malware. Grasping the phishing attack process is crucial to prevent and counteract this type of scam.
Italo Jose da Silva Oliveira   +8 more
openaire   +1 more source

AI-Driven Phishing Detection: Enhancing Cybersecurity with Reinforcement Learning

open access: yesJournal of Cybersecurity and Privacy
Phishing remains a persistent cybersecurity threat, often bypassing traditional detection methods due to evolving attack techniques. This study presents a Reinforcement Learning (RL)-based phishing detection framework, leveraging a Deep Q-Network (DQN ...
Haidar Jabbar, Samir Al-Janabi
doaj   +1 more source

Outflanking and securely using the PIN/TAN-System

open access: yes, 2005
The PIN/TAN-system is an authentication and authorization scheme used in e-business. Like other similar schemes it is successfully attacked by criminals.
Buchmann, J.   +3 more
core  

Home - About - Disclaimer - Privacy