Results 21 to 30 of about 28,445 (242)
Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher +3 more
core +1 more source
Spear-Phishing Susceptibility Stemming From Personality Traits
This study explores the psychological aspects of social engineering by analyzing personality traits in the context of spear-phishing attacks. Phishing emails were constructed by leveraging multiple vulnerable personality traits to maximize the success of
Sergiu Eftimie +2 more
doaj +1 more source
Scalable Detection and Isolation of Phishing [PDF]
This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and to employ the novel bad neighborhood concept, in order to detect and isolate both ...
Moreira Moura, G.C., Pras, A.
core +2 more sources
In recent years, there has been an increase in the number of phishing attacks targeting people in the fields of defense, security, and diplomacy around the world. In particular, hacking attack group Kimsuky has been conducting phishing attacks to collect
Jaeil Lee +4 more
doaj +1 more source
Clone Phishing: Attacks and Defenses
Clone phishing is a cyberattack in which offenders create a fake website or email that looks like a legitimate one to trick users into giving up sensitive information. This paper covers clone phishing strategies, examples, and impacts on people and organisations.
openaire +1 more source
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: 1) they store employees and students sensitive data, 2) they save confidential documents, 3) their infrastructures often ...
Marco Casagrande +3 more
doaj
Artificial intelligence in the cyber domain: Offense and defense [PDF]
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao +2 more
core +1 more source
In today’s technologically advanced world, the escalating prevalence of phishing attacks necessitates an urgent exploration of effective countermeasures.
Muhammad Waqas +3 more
doaj +1 more source
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity which compels them to share their personal, financial information.
Gupta, Srishti, Kumaraguru, Ponnurangam
core +1 more source
Despite the focus on improving cybersecurity awareness, the number of cyberattacks has increased significantly, leading to huge financial losses, with their risks spreading throughout the world. This is due to the techniques deployed in cyberattacks that
Raja Jabir, John Le, Chau Nguyen
doaj +1 more source

