Results 21 to 30 of about 28,445 (242)

Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]

open access: yes, 2010
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher   +3 more
core   +1 more source

Spear-Phishing Susceptibility Stemming From Personality Traits

open access: yesIEEE Access, 2022
This study explores the psychological aspects of social engineering by analyzing personality traits in the context of spear-phishing attacks. Phishing emails were constructed by leveraging multiple vulnerable personality traits to maximize the success of
Sergiu Eftimie   +2 more
doaj   +1 more source

Scalable Detection and Isolation of Phishing [PDF]

open access: yes, 2009
This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and to employ the novel bad neighborhood concept, in order to detect and isolate both ...
Moreira Moura, G.C., Pras, A.
core   +2 more sources

Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups

open access: yesIEEE Access, 2021
In recent years, there has been an increase in the number of phishing attacks targeting people in the fields of defense, security, and diplomacy around the world. In particular, hacking attack group Kimsuky has been conducting phishing attacks to collect
Jaeil Lee   +4 more
doaj   +1 more source

Clone Phishing: Attacks and Defenses

open access: yesInternational Journal of Scientific and Research Publications, 2023
Clone phishing is a cyberattack in which offenders create a fake website or email that looks like a legitimate one to trick users into giving up sensitive information. This paper covers clone phishing strategies, examples, and impacts on people and organisations.
openaire   +1 more source

Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution

open access: yesJournal of Cybersecurity Education, Research & Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: 1) they store employees and students sensitive data, 2) they save confidential documents, 3) their infrastructures often ...
Marco Casagrande   +3 more
doaj  

Artificial intelligence in the cyber domain: Offense and defense [PDF]

open access: yes, 2020
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao   +2 more
core   +1 more source

Enhancing Cybersecurity: The Crucial Role of Self-Regulation, Information Processing, and Financial Knowledge in Combating Phishing Attacks

open access: yesSAGE Open, 2023
In today’s technologically advanced world, the escalating prevalence of phishing attacks necessitates an urgent exploration of effective countermeasures.
Muhammad Waqas   +3 more
doaj   +1 more source

Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page

open access: yes, 2014
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity which compels them to share their personal, financial information.
Gupta, Srishti, Kumaraguru, Ponnurangam
core   +1 more source

Phishing Attacks in the Age of Generative Artificial Intelligence: A Systematic Review of Human Factors

open access: yesAI
Despite the focus on improving cybersecurity awareness, the number of cyberattacks has increased significantly, leading to huge financial losses, with their risks spreading throughout the world. This is due to the techniques deployed in cyberattacks that
Raja Jabir, John Le, Chau Nguyen
doaj   +1 more source

Home - About - Disclaimer - Privacy