Results 41 to 50 of about 318,491 (290)
Considerations on Preventing Social Engineering over the Internet [PDF]
The decrease of personal interactions, caused by the development of modern communication instruments (e-mail, Facebook, Twitter, Skype, Dropbox, LinkedIn, Lync etc.) has allowed the evolution of new methods of social engineering attacks, which, under ...
Mironela Pîrnău
doaj
Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK
Cyber adversaries have increasingly leveraged social engineering attacks to breach large organizations and threaten the well-being of today's online users.
Bittleston, Daniel +7 more
core +1 more source
Two-layer threat analysis model integrating macro and micro
The existing threat analysis models failed to comprehensively analyze the propagation of advanced security threats integrating the threat development trend and propagation path.In order to solve the problem, a two-layer threat analysis model named TL-TAM
Cheng SUN +3 more
doaj +3 more sources
OSINT-Based LPC-MTD and HS-Decoy for Organizational Defensive Deception
This study aimed to alleviate the theoretical limitations of existing moving target defense (MTD) and decoy concepts and improve the efficiency of defensive deception technology within an organization.
Sang Seo, Dohoon Kim
doaj +1 more source
An Effective Blockchain-Based Defense Model for Organizations against Vishing Attacks
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations.
Ahlam Fakieh, Aymen Akremi
doaj +1 more source
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention [PDF]
The objective of this study is to get insight into the effectiveness of an information campaign to counter a social engineering attack via the telephone.\ud Four different offenders phoned 48 employees and made them believe that their PC was distributing
Bullee, Jan-Willem +3 more
core +2 more sources
In the field of information security, there are several areas of study that are under development. Social engineering is one of them that addresses the multidisciplinary challenges of cyber security.
Patricio Zambrano +6 more
doaj +1 more source
Countering Social Engineering through Social Media: An Enterprise Security Perspective
The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities.
C Colwill +8 more
core +1 more source
Social engineering attack detection model: SEADM [PDF]
Social engineering is a real threat to industries in this day and age even though the severity of it is extremely downplayed. The difficulty with social engineering attacks is mostly the ability to identify them. Social engineers target call centre employees, as they are normally underpaid, under skilled workers whom have limited knowledge about the ...
Monique Bezuidenhout +2 more
openaire +1 more source
In recent years, there has been an increase in the number of phishing attacks targeting people in the fields of defense, security, and diplomacy around the world. In particular, hacking attack group Kimsuky has been conducting phishing attacks to collect
Jaeil Lee +4 more
doaj +1 more source

