Results 211 to 220 of about 28,445 (242)
The WeDDa framework for preventing smishing and vishing using protocol agnostic cryptographic trust. [PDF]
Salem MFM, Hamad EKI, El-Bendary MAM.
europepmc +1 more source
Clouding the Mirror: Stealthy Prompt Injection Attacks Targeting LLM-based Phishing Detection [PDF]
Takashi Koide +2 more
openalex
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 2019 ACM Southeast Conference, 2019
Social engineering is the process of getting a person to provide a service or complete a task that may give away private or confidential information. Phishing is the most common type of social engineering. In phishing, an attacker poses as a trustworthy source in an attempt to have the victim release personal or private information. Spear phishing is a
Alex Sumner, Xiaohong Yuan
openaire +1 more source
Social engineering is the process of getting a person to provide a service or complete a task that may give away private or confidential information. Phishing is the most common type of social engineering. In phishing, an attacker poses as a trustworthy source in an attempt to have the victim release personal or private information. Spear phishing is a
Alex Sumner, Xiaohong Yuan
openaire +1 more source
Phishing Attacks on Modern Android
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018Modern versions of Android have introduced a number of features in the name of convenience. This paper shows how two of these features, mobile password managers and Instant Apps, can be abused to make phishing attacks that are significantly more practical than existing ones.
Aonzo S. +3 more
openaire +1 more source
2021
Abstract: The Internet has a remarkable platform for common people communication. People with criminal mind have found a way of stealing personal information without actually meeting them and with the least risk of being caught. It`s far known as Phishing. Phishing poses a big danger to the e-commerce enterprise.
Josmy Joseph, Merin Manoj
openaire +1 more source
Abstract: The Internet has a remarkable platform for common people communication. People with criminal mind have found a way of stealing personal information without actually meeting them and with the least risk of being caught. It`s far known as Phishing. Phishing poses a big danger to the e-commerce enterprise.
Josmy Joseph, Merin Manoj
openaire +1 more source
Combating the Phishing Attacks
2022The phishing attack targets the client's email and any other connection medium to illicitly get the user credentials of e-commerce websites, educational websites, banks, credit card information, and other crucial user information. Exploitations caused by different types of cyberattacks result in data loss, identity theft, financial loss, and various ...
Sonia Tasmin +3 more
openaire +1 more source
2018 6th International Symposium on Digital Forensic and Security (ISDFS), 2018
Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions, including capturing the ...
Muhammet Baykara, Zahit Ziya Gurel
openaire +1 more source
Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions, including capturing the ...
Muhammet Baykara, Zahit Ziya Gurel
openaire +1 more source
Hunter Hunted - Mitigating Phishing Attacks
Journal of Computer Science and Its Application, 2012The webscape is swarmed with increasing numbers of emails and websites that attempts to deceive users into providing identity information by purporting to emanate from trusted entities. These e-mails referred to as “phishing e-mails” masquerade trusted party emblems, logos and trademarks and contains phony weblinks that compromise users ...
Longe, OB, Wada, F
openaire +2 more sources

