Results 41 to 50 of about 318,491 (290)

Considerations on Preventing Social Engineering over the Internet [PDF]

open access: yesMemoirs of the Scientific Sections of the Romanian Academy, 2017
The decrease of personal interactions, caused by the development of modern communication instruments (e-mail, Facebook, Twitter, Skype, Dropbox, LinkedIn, Lync etc.) has allowed the evolution of new methods of social engineering attacks, which, under ...
Mironela Pîrnău
doaj  

Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK

open access: yes, 2019
Cyber adversaries have increasingly leveraged social engineering attacks to breach large organizations and threaten the well-being of today's online users.
Bittleston, Daniel   +7 more
core   +1 more source

Two-layer threat analysis model integrating macro and micro

open access: yes网络与信息安全学报, 2021
The existing threat analysis models failed to comprehensively analyze the propagation of advanced security threats integrating the threat development trend and propagation path.In order to solve the problem, a two-layer threat analysis model named TL-TAM
Cheng SUN   +3 more
doaj   +3 more sources

OSINT-Based LPC-MTD and HS-Decoy for Organizational Defensive Deception

open access: yesApplied Sciences, 2021
This study aimed to alleviate the theoretical limitations of existing moving target defense (MTD) and decoy concepts and improve the efficiency of defensive deception technology within an organization.
Sang Seo, Dohoon Kim
doaj   +1 more source

An Effective Blockchain-Based Defense Model for Organizations against Vishing Attacks

open access: yesApplied Sciences, 2022
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations.
Ahlam Fakieh, Aymen Akremi
doaj   +1 more source

Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention [PDF]

open access: yes, 2016
The objective of this study is to get insight into the effectiveness of an information campaign to counter a social engineering attack via the telephone.\ud Four different offenders phoned 48 employees and made them believe that their PC was distributing
Bullee, Jan-Willem   +3 more
core   +2 more sources

Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach

open access: yesIEEE Access, 2019
In the field of information security, there are several areas of study that are under development. Social engineering is one of them that addresses the multidisciplinary challenges of cyber security.
Patricio Zambrano   +6 more
doaj   +1 more source

Countering Social Engineering through Social Media: An Enterprise Security Perspective

open access: yes, 2015
The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities.
C Colwill   +8 more
core   +1 more source

Social engineering attack detection model: SEADM [PDF]

open access: yes2010 Information Security for South Africa, 2010
Social engineering is a real threat to industries in this day and age even though the severity of it is extremely downplayed. The difficulty with social engineering attacks is mostly the ability to identify them. Social engineers target call centre employees, as they are normally underpaid, under skilled workers whom have limited knowledge about the ...
Monique Bezuidenhout   +2 more
openaire   +1 more source

Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups

open access: yesIEEE Access, 2021
In recent years, there has been an increase in the number of phishing attacks targeting people in the fields of defense, security, and diplomacy around the world. In particular, hacking attack group Kimsuky has been conducting phishing attacks to collect
Jaeil Lee   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy