Results 111 to 120 of about 24,070 (256)
ByteBait USB: a robust simulation toolkit for badUSB phishing campaign
Phishing, a prevalent cybercrime using social engineering, threatens individuals and enterprises despite existing protections. This paper addresses BadUSB devices in phishing campaigns, which exploit inherent trust in USB devices to execute malicious ...
Wenhao Li +5 more
doaj +1 more source
New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing [PDF]
E. Munivel, A. Kannammal
openalex +1 more source
The advent of the digital world does not always have positive impacts, it often poses serious attacks that can be highly detrimental to its users, one of which is phishing.
Dwi Wina Adani +2 more
doaj +1 more source
Scam Pandemic: How Attackers Exploit Public Fear through Phishing [PDF]
Marzieh Bitaab +11 more
openalex +1 more source
Detecting Phishing URLs Based on a Deep Learning Approach to Prevent Cyber-Attacks
Phishing is one of the most widely observed types of internet cyber-attack, through which hundreds of clients using different internet services are targeted every day through different replicated websites.
Qazi Emad ul Haq +2 more
doaj +1 more source
Phishing 2.0: exploring the capabilities and risks of agentic AI-enabled attacks
IntroductionPhishing attacks have evolved rapidly with the integration of artificial intelligence, posing serious threats to digital trust and cybersecurity.
Pankaj Chandre +5 more
doaj +1 more source
An Ontological Model of the Phishing Attack Process
Phishing attacks are common social engineering cyber attacks in which threat actors masquerade as reputable entities to mislead recipients into performing specific actions, such as revealing financial information, system login credentials, or installing malware. Grasping the phishing attack process is crucial to prevent and counteract this type of scam.
Italo Jose da Silva Oliveira +8 more
openaire +1 more source
AI-Driven Phishing Detection: Enhancing Cybersecurity with Reinforcement Learning
Phishing remains a persistent cybersecurity threat, often bypassing traditional detection methods due to evolving attack techniques. This study presents a Reinforcement Learning (RL)-based phishing detection framework, leveraging a Deep Q-Network (DQN ...
Haidar Jabbar, Samir Al-Janabi
doaj +1 more source
Outflanking and securely using the PIN/TAN-System
The PIN/TAN-system is an authentication and authorization scheme used in e-business. Like other similar schemes it is successfully attacked by criminals.
Buchmann, J. +3 more
core

