Results 11 to 20 of about 1,061,727 (224)

Generating Phishing Attacks using ChatGPT [PDF]

open access: yesarXiv.org, 2023
The ability of ChatGPT to generate human-like responses and understand context has made it a popular tool for conversational agents, content creation, data analysis, and research and innovation. However, its effectiveness and ease of accessibility makes it a prime target for generating malicious content, such as phishing attacks, that can put users at ...
Roy, Sayak Saha   +2 more
openaire   +3 more sources

Phishing Attacks Execution

open access: yesJournal of Information Systems Engineering and Management
The rapid advancement of technology has made cybersecurity a crucial industry. One such prominent menace is phishing, which refers to any fraudulent act aimed at collecting personal data like passwords and credit card information under the guise of genuine organizations.Phishing attacks are often performed through electronic email, social media ...
Haider Hadi   +2 more
openaire   +2 more sources

PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification

open access: yesIEEE Access, 2023
SI
Felipe Castaño   +3 more
openaire   +5 more sources

Thwarting Instant Messaging Phishing Attacks: The Role of Self-Efficacy and the Mediating Effect of Attitude towards Online Sharing of Personal Information. [PDF]

open access: yesInt J Environ Res Public Health, 2023
Context: The cause of cybercrime phishing threats in Malaysia is a lack of knowledge and awareness of phishing. Objective: The effects of self-efficacy (the ability to gain anti-phishing knowledge) and protection motivation (attitude toward sharing ...
Lee YY, Gan CL, Liew TW.
europepmc   +2 more sources

The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19. [PDF]

open access: yesIET Inf Secur, 2022
The COVID‐19 pandemic coincided with an equally‐threatening scamdemic: a global epidemic of scams and frauds. The unprecedented cybersecurity concerns emerged during the pandemic sparked a torrent of research to investigate cyber‐attacks and to propose ...
Al-Qahtani AF, Cresci S.
europepmc   +2 more sources

Cybersecurity Awareness Enhancement: A Study of the Effects of Age and Gender of Thai Employees Associated with Phishing Attacks. [PDF]

open access: yesEduc Inf Technol (Dordr), 2022
Cybersecurity is crucial at present because cyber threats (e.g., phishing) have become a very common occurrence in everyday life. A literature review showed that there are no studies based on cybersecurity awareness which involved a large number of Thai ...
Daengsi T   +2 more
europepmc   +2 more sources

A comprehensive survey of AI-enabled phishing attacks detection techniques. [PDF]

open access: yesTelecommun Syst, 2021
In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations.
Basit A   +5 more
europepmc   +2 more sources

Mitigation strategies against the phishing attacks: A systematic literature review

open access: yesComputers & security, 2023
Phishing attacks are among the most prevalent attack mechanisms employed by attackers. The consequences of successful phishing include (and are not limited to) financial losses, impact on reputation, and identity theft.
Bilal Naqvi   +5 more
semanticscholar   +1 more source

Phishing Attacks Detection A Machine Learning-Based Approach [PDF]

open access: yesUbiquitous Computing, Electronics & Mobile Communication Conference, 2021
Phishing attacks are one of the most common social engineering attacks targeting users’ emails to fraudulently steal confidential and sensitive information.
Fatima Salahdine   +2 more
semanticscholar   +1 more source

The Influence of Context on Response to Spear-Phishing Attacks: an In-Situ Deception Study

open access: yesInternational Conference on Human Factors in Computing Systems, 2023
In today’s digitized societies, phishing attacks are a security threat with damaging consequences. Organizations remain vulnerable to phishing attacks, and it is not clear how the work context influences people’s perceptions and behaviors related to ...
Verena Distler
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy