Results 91 to 100 of about 28,445 (242)
An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents
Phishing attacks have been persistent for more than two decades despite mitigation efforts from academia and industry. We believe that users fall victim to attacks not only because of lack of knowledge and awareness, but also because they are not ...
Jema David Ndibwile +5 more
doaj +1 more source
Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks
Phishing is an especially challenging cyber security threat as it does not attack computer systems, but targets the user who works on that system by relying on the vulnerability of their decision-making ability.
Arachchilage, Nalin Asanka Gamagedara +2 more
core
PHISHING ATTACKS, AS A FAVOURABLE CONDITION FOR TERRORIST ACTIVITIES
Ioana-Raluca Rusu
openalex +2 more sources
Phishing Attacks: Identification and Prevention
Phishing is a major source of insecurity within the internet. This is a kind of fraud in which an individual or a group of individuals aim to get access to valuable data and personal information of an internet user without consent. In this respect, it is extremely necessary to institute detection and preventive measures to protect internet users.
Alnaim, Abdullah, Alturk, Salem
openaire +1 more source
Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection
Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling.
Shakeel Ahmad +6 more
doaj +1 more source
The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19. [PDF]
Al-Qahtani AF, Cresci S.
europepmc +1 more source
Thwarting Instant Messaging Phishing Attacks: The Role of Self-Efficacy and the Mediating Effect of Attitude towards Online Sharing of Personal Information. [PDF]
Lee YY, Gan CL, Liew TW.
europepmc +1 more source
Your employees: the front line in cyber security [PDF]
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/
Ashenden, D
core
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identify phishing URLs.
Faloutsos, Michalis +2 more
core +2 more sources
EIP-7702 introduces a delegation-based authorization mechanism that allows an externally owned account (EOA) to authenticate a single authorization tuple, after which all subsequent calls are routed to arbitrary delegate code. We show that this design enables a qualitatively new class of phishing attacks: instead of deceiving users into signing ...
Qi, Minfeng +4 more
openaire +2 more sources

