Results 111 to 120 of about 28,445 (242)
Phishing 2.0: exploring the capabilities and risks of agentic AI-enabled attacks
IntroductionPhishing attacks have evolved rapidly with the integration of artificial intelligence, posing serious threats to digital trust and cybersecurity.
Pankaj Chandre +5 more
doaj +1 more source
Optimal Defense Strategy Selection for Spear-Phishing Attack Based on a Multistage Signaling Game
The integration of industrial control systems (ICS) with information technologies offers not only convenience but also creates security problems, from public networks to ICS.
Xiayang Chen +3 more
doaj +1 more source
The imminent threat that phishing websites poses is a major concern for internet users worldwide. These fraudulent websites are crafted by cyber attackers to appear trustworthy and deceive vulnerable users into divulging confidential data like medical ...
Emmanuel Song Shombot +3 more
doaj +1 more source
Towards Standardized Prevention of Unsolicited Communications and Phishing Attacks
JaeSeung Song, Andreas Künz
openalex +2 more sources
Scam Pandemic: How Attackers Exploit Public Fear through Phishing [PDF]
Marzieh Bitaab +11 more
openalex +1 more source
Towards a Hybrid Security Framework for Phishing Awareness Education and Defense
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks.
Peter K. K. Loh +2 more
doaj +1 more source
Phishing Attacks: Detection And Prevention
5 pages, 7 figures, 1 table, essential ...
openaire +2 more sources
Phishing attacks are a growing threat that has evolved along with technological advancements. Existing detection methods struggle with constantly evolving tactics and “zero-day” attacks that exploit unknown vulnerabilities.
Gabriela Brezeanu +2 more
doaj +1 more source
Protection Mechanisms Against Phishing Attacks
Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probability of a scammer being successful without changing the existing PIN/TAN-method on the other hand. We present a new approach, based on challenge-response-authentication.
Plössl, Klaus +2 more
openaire +2 more sources

