Results 91 to 100 of about 28,445 (242)

An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents

open access: yesIEEE Access, 2019
Phishing attacks have been persistent for more than two decades despite mitigation efforts from academia and industry. We believe that users fall victim to attacks not only because of lack of knowledge and awareness, but also because they are not ...
Jema David Ndibwile   +5 more
doaj   +1 more source

Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks

open access: yes, 2017
Phishing is an especially challenging cyber security threat as it does not attack computer systems, but targets the user who works on that system by relying on the vulnerability of their decision-making ability.
Arachchilage, Nalin Asanka Gamagedara   +2 more
core  

Phishing Attacks: Identification and Prevention

open access: yes, 2022
Phishing is a major source of insecurity within the internet. This is a kind of fraud in which an individual or a group of individuals aim to get access to valuable data and personal information of an internet user without consent. In this respect, it is extremely necessary to institute detection and preventive measures to protect internet users.
Alnaim, Abdullah, Alturk, Salem
openaire   +1 more source

Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection

open access: yesIEEE Open Journal of the Communications Society
Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling.
Shakeel Ahmad   +6 more
doaj   +1 more source

Your employees: the front line in cyber security [PDF]

open access: yes, 2016
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/
Ashenden, D
core  

PhishDef: URL Names Say It All

open access: yes, 2010
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identify phishing URLs.
Faloutsos, Michalis   +2 more
core   +2 more sources

EIP-7702 Phishing Attack

open access: yes
EIP-7702 introduces a delegation-based authorization mechanism that allows an externally owned account (EOA) to authenticate a single authorization tuple, after which all subsequent calls are routed to arbitrary delegate code. We show that this design enables a qualitatively new class of phishing attacks: instead of deceiving users into signing ...
Qi, Minfeng   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy