Results 51 to 60 of about 318,491 (290)

Towards a metric for recognition-based graphical password security [PDF]

open access: yes, 2011
Recognition-based graphical password (RBGP) schemes are not easily compared in terms of security. Current research uses many different measures which results in confusion as to whether RBGP schemes are secure against guessing and capture attacks.
English, R., Poet, R.
core   +1 more source

Advanced Social Engineering Attack Techniques

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2022
Abstract: This paper explains the emergence of Social Engineering techniques that can be deadly and effective and are being heavily watched by the Department of Defense and the FBI. The increased use of the Internet and cell phones has made it possible for most people to communicate, surf the web, or transfer data anywhere in the world.
openaire   +1 more source

Organ‐specific redox imbalances in spinal muscular atrophy mice are partially rescued by SMN antisense oligonucleotides

open access: yesFEBS Letters, EarlyView.
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley   +1 more source

Analysis of Social Engineering Awareness Among Students and Lecturers

open access: yesIEEE Access, 2023
The massive technological progress and wide use of Information Technology have increased cyber security threats. Social engineering attacks are a common type of cyber security threat that faces everyone.
Raza M. Abdulla   +4 more
doaj   +1 more source

Mechanisms of IgE‐mediated food allergy and the role of allergen‐specific B cells

open access: yesFEBS Letters, EarlyView.
Food allergy arises when allergen‐specific B cells preferentially produce immunoglobulin E (IgE) antibodies against harmless foods. This article explains the mechanisms driving IgE‐mediated reactions, highlights the central role of these B cells, and discusses how natural tolerance (NT) and oral immunotherapy (OIT) can reshape allergic immune responses.
Juan‐Felipe López   +2 more
wiley   +1 more source

A New Role for Human Resource Managers: Social Engineering Defense [PDF]

open access: yes, 2016
[Excerpt] The general risk of social engineering attacks to organizations has increased with the rise of digital computing and communications, while for an attacker the risk has decreased.
Seidenberger, Scott
core   +1 more source

Improving Awareness of Social Engineering Attacks [PDF]

open access: yes, 2013
Social engineering is a method of attack involving the exploitation of human weakness, gullibility and ignorance. Although related techniques have existed for some time, current awareness of social engineering and its many guises is relatively low and efforts are therefore required to improve the protection of the user community.
Smith, Aaron   +2 more
openaire   +2 more sources

A methionine‐lined active site governs carbocation stabilization and product specificity in a bacterial terpene synthase

open access: yesFEBS Letters, EarlyView.
This study reveals a unique active site enriched in methionine residues and demonstrates that these residues play a critical role by stabilizing carbocation intermediates through novel sulfur–cation interactions. Structure‐guided mutagenesis further revealed variants with significantly altered product profiles, enhancing pseudopterosin formation. These
Marion Ringel   +13 more
wiley   +1 more source

Reverse Social Engineering Attacks in Online Social Networks

open access: yes, 2011
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has been reporting growth rates as high as 3% per week. One of the key features of social networks is the support they provide for finding new friends. For example, social network
Irani D.   +4 more
openaire   +3 more sources

Social Engineering Attacks on Facebook – A Case Study

open access: yesInternational Journal of Case Studies in Business, IT, and Education, 2021
Background/Purpose: Facebook is an American business that offer online social networking services. Facebook was founded in 2004 by Harvard University freshmen Mark Zuckerberg, Eduardo Saverin, Dustin Moskovitz, and Chris Hughes. Free access to Facebook enables new users to create profiles, upload photos to existing groups, and start new ones.
Pallivalappil, Abdul Shareef   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy