Results 41 to 50 of about 27,296 (205)

A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies

open access: yesWasit Journal for Pure Sciences, 2023
People are increasingly sharing their personal information online as internet usage grows. As a result, fraudsters have access to a massive amount of personal information and financial activities.
Riyadh Rahef Nuiaa Al Ogaili   +1 more
doaj   +1 more source

Refining the PoinTER “human firewall” pentesting framework [PDF]

open access: yes, 2019
PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the ...
Archibald, Jacqueline M., Renaud, Karen
core   +3 more sources

Phishing Attacks in the Age of Generative Artificial Intelligence: A Systematic Review of Human Factors

open access: yesAI
Despite the focus on improving cybersecurity awareness, the number of cyberattacks has increased significantly, leading to huge financial losses, with their risks spreading throughout the world. This is due to the techniques deployed in cyberattacks that
Raja Jabir, John Le, Chau Nguyen
doaj   +1 more source

Phishing Techniques in Mobile Devices

open access: yes, 2018
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to
Amro, Belal
core   +1 more source

Phishing Attacks: Detection And Prevention

open access: yesCoRR, 2020
5 pages, 7 figures, 1 table, essential ...
openaire   +2 more sources

Analysis of Phishing Attacks and Countermeasures

open access: yesCoRR, 2014
8 ...
Biju Issac 0001   +2 more
openaire   +2 more sources

Plugging the “Phishing” Hole: Legislation Versus Technology [PDF]

open access: yes, 2005
This iBrief analyzes the Anti-Phishing Act of 2005, legislation aimed at curbing the problem of phishing. Phishing is the sending of fraudulent emails which appear to be from legitimate businesses and thereby fooling the recipients into divulging ...
Ekerstad, Niklas   +2 more
core   +2 more sources

The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia

open access: yesSoshum: Jurnal Sosial dan Humaniora
The advent of the digital world does not always have positive impacts, it often poses serious attacks that can be highly detrimental to its users, one of which is phishing.
Dwi Wina Adani   +2 more
doaj   +1 more source

Toward a phishing attack ontology. [PDF]

open access: yes, 2023
Phishing attacks are the most common form of social engineering where attackers intend to deceive targeted people into revealing sensitive information or installing malware. To understand the dynamics of phishing attacks and design suitable countermeasures, particularly the promotion of phishing awareness, cybersecurity researchers have proposed ...
Oliveira, Ítalo   +2 more
openaire   +1 more source

Classification of Phishing Email Using Random Forest Machine Learning Technique

open access: yesJournal of Applied Mathematics, 2014
Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals.
Andronicus A. Akinyelu   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy