Results 211 to 220 of about 1,061,727 (224)
Some of the next articles are maybe not open access.

Phishing Attacks

2010
Carl Timm, Richard Perez
openaire   +1 more source

Phishing Attacks and Prevention

Phishing attacks have been the number one leading cause of identity theft and financial theft since 1990. The internet is one of the leading places where individuals’ identity is stolen. Many businesses and government agencies have been at risk of cyber phishing attacks from foreign countries. Attacks on Several U.S.
openaire   +1 more source

Detection of fake web pages and phishing attacks with rabbit optimization algorithm

Journal of Supercomputing
Leyla Shahba   +2 more
semanticscholar   +1 more source

Applied Trends in Phishing Attacks

2022
Human workings and behaviours around the world are undergoing great modification and beneficial progress as a result of rapid and unending technological advancements. The use of technological improvement has truly redefined human efficiency, making profit centres all over the world.
openaire   +1 more source

Phishing Attack and Defense

2023
Taiwo O. Olaleye   +7 more
openaire   +1 more source

Phishing Attacks Awareness Exercise Example

2020
Users are seen as the weakest link in the information security chain. While many systems are installed to provide information security in institutions, they cannotprovide full security and cannot prevent some attacks from reaching users. For this reason, enterprise information security can not be mentioned without going down to the end-user level.
openaire   +1 more source

Overview on Phishing Attacks

International Journal of Information Security and Cybercrime, 2012
openaire   +1 more source

Phishing attacks and mitigation tactics

2020
Social engineering-based attacks, such as phishing and more targeted, spear phishing attacks remains to be one of the most common attack vectors used by threat actors. These attacks are most commonly used to obtain initial access into the target’s internal network, for example through compromised endpoint.
openaire   +1 more source

Home - About - Disclaimer - Privacy