Results 201 to 210 of about 1,061,727 (224)
Some of the next articles are maybe not open access.
Don't feed the phish: how to avoid phishing attacks
Network Security, 2019We've all heard the phishing attack stories that start with someone receiving an email that requests an urgent invoice review or password change and ends with a data breach in which personal information is compromised and money is lost. Although many of us may roll our eyes at the prospect of falling for such an obvious scam, we must acknowledge that ...
openaire +1 more source
Phishing Attacks and Countermeasures
2010This chapter surveys phishing attacks and their countermeasures. We first examine the underlying ecosystem that facilitates these attacks. Then we go into some detail with regard to the techniques phishers use, the kind of brands they target, as well as variations on traditional attacks. Finally, we describe several proposed countermeasures to phishing
openaire +1 more source
Adopting automated whitelist approach for detecting phishing attacks
Computers & security, 2021N. Azeez +4 more
semanticscholar +1 more source
Phishing Attacks and Countermeasures
2007The field of information security has realized many advances in the past few decades. Some of these innovations include new cryptographic techniques, network protocols, and hardware tokens. However, the weakest link in information security systems, human gullibility, remains extremely vulnerable.
openaire +1 more source
malware phishing mobile attacks.
ABSTRACT We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality ...openaire +1 more source
International Convention on Information and Communication Technology, Electronics and Microelectronics, 2022
A. Kovac, I. Dunder, S. Seljan
semanticscholar +1 more source
A. Kovac, I. Dunder, S. Seljan
semanticscholar +1 more source
Modeling Email Phishing Attacks
Cheating, beguiling, and misleading information exist all around us; understanding deception and its consequences is crucial in our information environment. This study investigates deception in phishing emails that successfully bypassed Microsoft 365 filtering system.openaire +2 more sources
Phishing Attacks and Solutions
Proceedings of the 3rd International ICST Conference on Mobile Multimedia Communications, 2007Mohamad Badra +2 more
openaire +1 more source

