Results 111 to 120 of about 1,061,727 (224)
Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks
Phishing is an especially challenging cyber security threat as it does not attack computer systems, but targets the user who works on that system by relying on the vulnerability of their decision-making ability.
Arachchilage, Nalin Asanka Gamagedara +2 more
core
Your employees: the front line in cyber security [PDF]
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/
Ashenden, D
core
In recent years, phishing attacks have gotten more complicated and harder to detect. Technology-based preventative approaches have become utterly ineffective.
Ratna Yudhiyati +2 more
doaj +1 more source
Phishing Attacks: Identification and Prevention
Phishing is a major source of insecurity within the internet. This is a kind of fraud in which an individual or a group of individuals aim to get access to valuable data and personal information of an internet user without consent. In this respect, it is extremely necessary to institute detection and preventive measures to protect internet users.
Alnaim, Abdullah, Alturk, Salem
openaire +1 more source
Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection
Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling.
Shakeel Ahmad +6 more
doaj +1 more source
To deceive or not to deceive! Legal implications of phishing covert research
Whilst studying mobile users' susceptibility to phishing attacks, we found ourselves subject to regulations concerning the use of deception in research. We argue that such regulations are misapplied in a way that hinders the progress of security research.
Sugiura, Lisa
core +1 more source
EIP-7702 introduces a delegation-based authorization mechanism that allows an externally owned account (EOA) to authenticate a single authorization tuple, after which all subsequent calls are routed to arbitrary delegate code. We show that this design enables a qualitatively new class of phishing attacks: instead of deceiving users into signing ...
Qi, Minfeng +4 more
openaire +2 more sources
Qualitative exploration of trust towards online banking for phishing attack victims / Siti Sarah Md Ilyas [PDF]
The number of phishing attacks involving online banking has records an increase percentage over the years in Malaysia. Phishing attacks impact the victims in various sentiments of emotional, mental and physical. The enormous effect is the victims exposed
Md Ilyas, Siti Sarah
core
Cyber-crime Science = Crime Science + Information Security [PDF]
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science.
Hartel, Pieter +2 more
core +2 more sources
Optimal Defense Strategy Selection for Spear-Phishing Attack Based on a Multistage Signaling Game
The integration of industrial control systems (ICS) with information technologies offers not only convenience but also creates security problems, from public networks to ICS.
Xiayang Chen +3 more
doaj +1 more source

