Results 41 to 50 of about 27,296 (205)
People are increasingly sharing their personal information online as internet usage grows. As a result, fraudsters have access to a massive amount of personal information and financial activities.
Riyadh Rahef Nuiaa Al Ogaili +1 more
doaj +1 more source
Refining the PoinTER “human firewall” pentesting framework [PDF]
PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the ...
Archibald, Jacqueline M., Renaud, Karen
core +3 more sources
Despite the focus on improving cybersecurity awareness, the number of cyberattacks has increased significantly, leading to huge financial losses, with their risks spreading throughout the world. This is due to the techniques deployed in cyberattacks that
Raja Jabir, John Le, Chau Nguyen
doaj +1 more source
Phishing Techniques in Mobile Devices
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to
Amro, Belal
core +1 more source
Phishing Attacks: Detection And Prevention
5 pages, 7 figures, 1 table, essential ...
openaire +2 more sources
Analysis of Phishing Attacks and Countermeasures
8 ...
Biju Issac 0001 +2 more
openaire +2 more sources
Plugging the “Phishing” Hole: Legislation Versus Technology [PDF]
This iBrief analyzes the Anti-Phishing Act of 2005, legislation aimed at curbing the problem of phishing. Phishing is the sending of fraudulent emails which appear to be from legitimate businesses and thereby fooling the recipients into divulging ...
Ekerstad, Niklas +2 more
core +2 more sources
The advent of the digital world does not always have positive impacts, it often poses serious attacks that can be highly detrimental to its users, one of which is phishing.
Dwi Wina Adani +2 more
doaj +1 more source
Toward a phishing attack ontology. [PDF]
Phishing attacks are the most common form of social engineering where attackers intend to deceive targeted people into revealing sensitive information or installing malware. To understand the dynamics of phishing attacks and design suitable countermeasures, particularly the promotion of phishing awareness, cybersecurity researchers have proposed ...
Oliveira, Ítalo +2 more
openaire +1 more source
Classification of Phishing Email Using Random Forest Machine Learning Technique
Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals.
Andronicus A. Akinyelu +1 more
doaj +1 more source

