Results 31 to 40 of about 24,070 (256)

Clone Phishing: Attacks and Defenses

open access: yesInternational Journal of Scientific and Research Publications, 2023
 Clone phishing is a cyberattack in which offenders create a fake website or email that looks like a legitimate one to trick users into giving up sensitive information. This paper covers clone phishing strategies, examples, and impacts on people and organisations.
openaire   +1 more source

PALPAS - PAsswordLess PAssword Synchronization [PDF]

open access: yes, 2015
Tools that synchronize passwords over several user devices typically store the encrypted passwords in a central online database. For encryption, a low-entropy, password-based key is used.
Buchmann, Johannes   +2 more
core   +5 more sources

A Two-Stage Hybrid Approach for Phishing Attack Detection Using URL and Content Analysis in IoT [PDF]

open access: yesBIO Web of Conferences
The goal of phishing assaults is to trick users into giving up personal information by making them believe they need to act quickly on critical information.
Yousif Mohammed Sahar   +6 more
doaj   +1 more source

Refining the PoinTER “human firewall” pentesting framework [PDF]

open access: yes, 2019
PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the ...
Archibald, Jacqueline M., Renaud, Karen
core   +3 more sources

Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites

open access: yesIEEE Access, 2023
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information.
Wenhao Li   +3 more
doaj   +1 more source

Binary Hunter–Prey Optimization with Machine Learning—Based Cybersecurity Solution on Internet of Things Environment

open access: yesSensors, 2023
Internet of Things (IoT) enables day-to-day objects to connect with the Internet and transmit and receive data for meaningful purposes. Recently, IoT has resulted in many revolutions in all sectors. Nonetheless, security risks to IoT networks and devices
Adil O. Khadidos   +5 more
doaj   +1 more source

Analyzing Social and Stylometric Features to Identify Spear phishing Emails

open access: yes, 2014
Spear phishing is a complex targeted attack in which, an attacker harvests information about the victim prior to the attack. This information is then used to create sophisticated, genuine-looking attack vectors, drawing the victim to compromise ...
Dewan, Prateek   +2 more
core   +1 more source

A Review on Antiphishing Framework [PDF]

open access: yes, 2017
Phishing is an attack that deals with social engineering system to illegally get and utilize another person's information for the benefit of authentic site for possess advantage (e.g.
Akhare, S. (Sonal)   +5 more
core   +1 more source

Phishing Attacks: Detection And Prevention

open access: yesCoRR, 2020
5 pages, 7 figures, 1 table, essential ...
openaire   +2 more sources

Analysis of Phishing Attacks and Countermeasures

open access: yesCoRR, 2014
8 ...
Biju Issac 0001   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy