Results 41 to 50 of about 1,061,727 (224)

Clone Phishing: Attacks and Defenses

open access: yesInternational Journal of Scientific and Research Publications, 2023
Clone phishing is a cyberattack in which offenders create a fake website or email that looks like a legitimate one to trick users into giving up sensitive information. This paper covers clone phishing strategies, examples, and impacts on people and organisations.
openaire   +1 more source

Context-Based Clustering to Mitigate Phishing Attacks

open access: yesAISec@CCS, 2022
Phishing is by far the most common and disruptive type of cyber-attack faced by most organizations. Phishing messages may share common attributes such as the same or similar subject lines, the same sending infrastructure, similar URLs with certain parts ...
Tarini Saka   +2 more
semanticscholar   +1 more source

Analysis and prevention of AI-based phishing email attacks [PDF]

open access: yesElectronics
Phishing email attacks are among the most common and most harmful cybersecurity attacks. With the emergence of generative AI, phishing attacks can be based on emails generated automatically, making it more difficult to detect them.
Chibuike Samuel Eze, Lior Shamir
semanticscholar   +1 more source

Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution

open access: yesJournal of Cybersecurity Education, Research & Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: 1) they store employees and students sensitive data, 2) they save confidential documents, 3) their infrastructures often ...
Marco Casagrande   +3 more
doaj  

Artificial intelligence in the cyber domain: Offense and defense [PDF]

open access: yes, 2020
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao   +2 more
core   +1 more source

A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies

open access: yesWasit Journal for Pure Sciences, 2023
People are increasingly sharing their personal information online as internet usage grows. As a result, fraudsters have access to a massive amount of personal information and financial activities.
Riyadh Rahef Nuiaa Al Ogaili   +1 more
doaj   +1 more source

Detection of E-Mail Phishing Attacks – using Machine Learning and Deep Learning

open access: yesInternational Journal of Computer Applications, 2022
Phishing is the most prominent cyber-crime that uses camouflaged e-mail as a weapon. In simple words, it is defined as the strategy adopted by fraudsters in-order-to get private details from persons by professing to be from well-known channels like ...
Dhruv Rathee, Suman Mann
semanticscholar   +1 more source

A phishing attack awareness framework for a South African University of Technology

open access: yesSouth African Journal of Information Management
Background: Phishing is a deceptive tactic in which an attacker impersonates a trusted entity to steal sensitive information from Internet users. This creates significant risks for university end-users who depend on computer networks, underscoring the ...
Japhet M. Kayomb   +2 more
doaj   +1 more source

Enhancing Cybersecurity: The Crucial Role of Self-Regulation, Information Processing, and Financial Knowledge in Combating Phishing Attacks

open access: yesSAGE Open, 2023
In today’s technologically advanced world, the escalating prevalence of phishing attacks necessitates an urgent exploration of effective countermeasures.
Muhammad Waqas   +3 more
doaj   +1 more source

Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page

open access: yes, 2014
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity which compels them to share their personal, financial information.
Gupta, Srishti, Kumaraguru, Ponnurangam
core   +1 more source

Home - About - Disclaimer - Privacy