Results 131 to 140 of about 1,061,727 (224)

Phishing vulnerability and personality traits: Insights from a systematic review

open access: yesComputers in Human Behavior Reports
Phishing attacks have gained prominence and effectiveness over the years. Although many efforts are devoted to combat them, generic anti-phishing awareness and training campaigns have shown limited success.
Pablo López-Aguilar   +4 more
doaj   +1 more source

Phish-blocker: Safeguarding against Phishing Attacks in Real-Time

open access: yesInternational Journal for Research in Applied Science and Engineering Technology
Abstract: Phishing is defined as a cyber attack that uses social engineering through digital tools to persuade victims to reveal personal information such as their passwords or credit card numbers. Finally, stolen personal information is used to fraudulently trust legitimate websites or financial institutions and generate illegal profits.
openaire   +1 more source

Study on Phishing Attacks

open access: yesInternational Journal of Computer Applications, 2018
Shabnam Sharma   +2 more
openaire   +1 more source

Phishing Attacks and Defenses

open access: yesInternational Journal of Security and Its Applications, 2016
Junaid Ahsenali Chaudhry   +2 more
openaire   +1 more source

Phishing threat mitigation in E-commerce using a quantum-enhanced hybrid AI framework. [PDF]

open access: yesSci Rep
Gupta BB   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy