Results 31 to 40 of about 24,070 (256)
Clone Phishing: Attacks and Defenses
Clone phishing is a cyberattack in which offenders create a fake website or email that looks like a legitimate one to trick users into giving up sensitive information. This paper covers clone phishing strategies, examples, and impacts on people and organisations.
openaire +1 more source
PALPAS - PAsswordLess PAssword Synchronization [PDF]
Tools that synchronize passwords over several user devices typically store the encrypted passwords in a central online database. For encryption, a low-entropy, password-based key is used.
Buchmann, Johannes +2 more
core +5 more sources
A Two-Stage Hybrid Approach for Phishing Attack Detection Using URL and Content Analysis in IoT [PDF]
The goal of phishing assaults is to trick users into giving up personal information by making them believe they need to act quickly on critical information.
Yousif Mohammed Sahar +6 more
doaj +1 more source
Refining the PoinTER “human firewall” pentesting framework [PDF]
PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the ...
Archibald, Jacqueline M., Renaud, Karen
core +3 more sources
Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information.
Wenhao Li +3 more
doaj +1 more source
Internet of Things (IoT) enables day-to-day objects to connect with the Internet and transmit and receive data for meaningful purposes. Recently, IoT has resulted in many revolutions in all sectors. Nonetheless, security risks to IoT networks and devices
Adil O. Khadidos +5 more
doaj +1 more source
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Spear phishing is a complex targeted attack in which, an attacker harvests information about the victim prior to the attack. This information is then used to create sophisticated, genuine-looking attack vectors, drawing the victim to compromise ...
Dewan, Prateek +2 more
core +1 more source
A Review on Antiphishing Framework [PDF]
Phishing is an attack that deals with social engineering system to illegally get and utilize another person's information for the benefit of authentic site for possess advantage (e.g.
Akhare, S. (Sonal) +5 more
core +1 more source
Phishing Attacks: Detection And Prevention
5 pages, 7 figures, 1 table, essential ...
openaire +2 more sources
Analysis of Phishing Attacks and Countermeasures
8 ...
Biju Issac 0001 +2 more
openaire +2 more sources

