Results 201 to 210 of about 1,061,727 (224)
Some of the next articles are maybe not open access.

Don't feed the phish: how to avoid phishing attacks

Network Security, 2019
We've all heard the phishing attack stories that start with someone receiving an email that requests an urgent invoice review or password change and ends with a data breach in which personal information is compromised and money is lost. Although many of us may roll our eyes at the prospect of falling for such an obvious scam, we must acknowledge that ...
openaire   +1 more source

Phishing Attacks and Countermeasures

2010
This chapter surveys phishing attacks and their countermeasures. We first examine the underlying ecosystem that facilitates these attacks. Then we go into some detail with regard to the techniques phishers use, the kind of brands they target, as well as variations on traditional attacks. Finally, we describe several proposed countermeasures to phishing
openaire   +1 more source

Anti-Phishing Attacks in Gamification

2021
Yousef Al-Hamar   +2 more
openaire   +1 more source

Adopting automated whitelist approach for detecting phishing attacks

Computers & security, 2021
N. Azeez   +4 more
semanticscholar   +1 more source

Phishing Attacks and Countermeasures

2007
The field of information security has realized many advances in the past few decades. Some of these innovations include new cryptographic techniques, network protocols, and hardware tokens. However, the weakest link in information security systems, human gullibility, remains extremely vulnerable.
openaire   +1 more source

malware phishing mobile attacks.

ABSTRACT We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality ...
openaire   +1 more source

Analysis of phishing attacks

2023
Ladislav Burita   +2 more
openaire   +1 more source

An overview of machine learning algorithms for detecting phishing attacks on electronic messaging services

International Convention on Information and Communication Technology, Electronics and Microelectronics, 2022
A. Kovac, I. Dunder, S. Seljan
semanticscholar   +1 more source

Modeling Email Phishing Attacks

Cheating, beguiling, and misleading information exist all around us; understanding deception and its consequences is crucial in our information environment. This study investigates deception in phishing emails that successfully bypassed Microsoft 365 filtering system.
openaire   +2 more sources

Phishing Attacks and Solutions

Proceedings of the 3rd International ICST Conference on Mobile Multimedia Communications, 2007
Mohamad Badra   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy