Results 161 to 170 of about 27,296 (205)
Some of the next articles are maybe not open access.
Phishing Attacks Modifications and Evolutions
Lecture Notes in Computer Science, 2018So-called “phishing attacks” are attacks in which phishing sites are disguised as legitimate websites in order to steal sensitive information.
Qian Cui +4 more
exaly +2 more sources
Phishing Attacks on Modern Android
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018Modern versions of Android have introduced a number of features in the name of convenience. This paper shows how two of these features, mobile password managers and Instant Apps, can be abused to make phishing attacks that are significantly more practical than existing ones.
Aonzo S. +3 more
openaire +1 more source
Proceedings of the 2019 ACM Southeast Conference, 2019
Social engineering is the process of getting a person to provide a service or complete a task that may give away private or confidential information. Phishing is the most common type of social engineering. In phishing, an attacker poses as a trustworthy source in an attempt to have the victim release personal or private information. Spear phishing is a
Alex Sumner, Xiaohong Yuan
openaire +1 more source
Social engineering is the process of getting a person to provide a service or complete a task that may give away private or confidential information. Phishing is the most common type of social engineering. In phishing, an attacker poses as a trustworthy source in an attempt to have the victim release personal or private information. Spear phishing is a
Alex Sumner, Xiaohong Yuan
openaire +1 more source
Communications of the ACM, 2012
Looking past the systems people use, they target the people using the systems.
openaire +1 more source
Looking past the systems people use, they target the people using the systems.
openaire +1 more source
Combating the Phishing Attacks
2022The phishing attack targets the client's email and any other connection medium to illicitly get the user credentials of e-commerce websites, educational websites, banks, credit card information, and other crucial user information. Exploitations caused by different types of cyberattacks result in data loss, identity theft, financial loss, and various ...
Sonia Tasmin +3 more
openaire +1 more source
Don't feed the phish: how to avoid phishing attacks
Network Security, 2019We've all heard the phishing attack stories that start with someone receiving an email that requests an urgent invoice review or password change and ends with a data breach in which personal information is compromised and money is lost. Although many of us may roll our eyes at the prospect of falling for such an obvious scam, we must acknowledge that ...
openaire +1 more source
2018 6th International Symposium on Digital Forensic and Security (ISDFS), 2018
Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions, including capturing the ...
Muhammet Baykara, Zahit Ziya Gurel
openaire +1 more source
Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions, including capturing the ...
Muhammet Baykara, Zahit Ziya Gurel
openaire +1 more source
Modeling and Preventing Phishing Attacks
2005A first contribution of this paper is a theoretical yet practically applicable model covering a large set of phishing attacks, aimed towards developing an understanding of threats relating to phishing. We model an attack by a phishing graph in which nodes correspond to knowledge or access rights, and (directed) edges correspond to means of obtaining ...
openaire +1 more source
Attribute-Based Prevention of Phishing Attacks
2009 Eighth IEEE International Symposium on Network Computing and Applications, 2009This paper describes a set of innovative attribute based checks for defending against phishing attacks. We explain a number of anti-phishing algorithms implemented as plugins and highlight which attributes of phishing sites they consider.To assess the effectiveness and applicability of this prototype,we performed extensive experimental testing.
Michael Atighetchi, Partha P. Pal
openaire +1 more source
Phishing Attacks and Solutions
Proceedings of the 3rd International ICST Conference on Mobile Multimedia Communications, 2007Mohamad Badra +2 more
openaire +1 more source

