Results 41 to 50 of about 1,061,727 (224)
Clone Phishing: Attacks and Defenses
Clone phishing is a cyberattack in which offenders create a fake website or email that looks like a legitimate one to trick users into giving up sensitive information. This paper covers clone phishing strategies, examples, and impacts on people and organisations.
openaire +1 more source
Context-Based Clustering to Mitigate Phishing Attacks
Phishing is by far the most common and disruptive type of cyber-attack faced by most organizations. Phishing messages may share common attributes such as the same or similar subject lines, the same sending infrastructure, similar URLs with certain parts ...
Tarini Saka +2 more
semanticscholar +1 more source
Analysis and prevention of AI-based phishing email attacks [PDF]
Phishing email attacks are among the most common and most harmful cybersecurity attacks. With the emergence of generative AI, phishing attacks can be based on emails generated automatically, making it more difficult to detect them.
Chibuike Samuel Eze, Lior Shamir
semanticscholar +1 more source
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: 1) they store employees and students sensitive data, 2) they save confidential documents, 3) their infrastructures often ...
Marco Casagrande +3 more
doaj
Artificial intelligence in the cyber domain: Offense and defense [PDF]
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao +2 more
core +1 more source
People are increasingly sharing their personal information online as internet usage grows. As a result, fraudsters have access to a massive amount of personal information and financial activities.
Riyadh Rahef Nuiaa Al Ogaili +1 more
doaj +1 more source
Detection of E-Mail Phishing Attacks – using Machine Learning and Deep Learning
Phishing is the most prominent cyber-crime that uses camouflaged e-mail as a weapon. In simple words, it is defined as the strategy adopted by fraudsters in-order-to get private details from persons by professing to be from well-known channels like ...
Dhruv Rathee, Suman Mann
semanticscholar +1 more source
A phishing attack awareness framework for a South African University of Technology
Background: Phishing is a deceptive tactic in which an attacker impersonates a trusted entity to steal sensitive information from Internet users. This creates significant risks for university end-users who depend on computer networks, underscoring the ...
Japhet M. Kayomb +2 more
doaj +1 more source
In today’s technologically advanced world, the escalating prevalence of phishing attacks necessitates an urgent exploration of effective countermeasures.
Muhammad Waqas +3 more
doaj +1 more source
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity which compels them to share their personal, financial information.
Gupta, Srishti, Kumaraguru, Ponnurangam
core +1 more source

