Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher +3 more
core +1 more source
Protection against attacks using social engineering tools and methods
Objective. In the modern world, innovative technologies are actively developing, communications are moving into the Internet space. Nevertheless, new technologies turned out to be in demand in the segment of organizations, individuals, cyber fraudsters ...
V. A. Repenko, S. A. Reznichenko
doaj +1 more source
ANALYSIS OF USERS’ PROTECTION FROM SOCIO-ENGINEERING ATTACKS: SOCIAL GRAPH CREATION BASED ON INFORMATION FROM SOCIAL NETWORK WEBSITES [PDF]
Subject of Research. The paper deals with accounts in social network websites as a source of information about the intensity of communication between employees in the team.
M. V. Abramov +2 more
doaj +1 more source
A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks [PDF]
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strategies to psychologically manipulate a user.
Heartfield, Ryan, Loukas, George
core +2 more sources
Social Engineering Attack Strategies and Defence Approaches [PDF]
This paper examines the role and value of information security awareness efforts in defending against social engineering attacks. It categories the different social engineering threats and tactics used in targeting employees and the approaches to defend against such attacks.
Ghafir, I +3 more
openaire +2 more sources
SEADer++: social engineering attack detection in online environments using machine learning
Social engineering attacks are one of the most well-known and easiest to apply attacks in the cybersecurity domain. Research has shown that the majority of attacks against computer systems was based on the use of social engineering methods.
Merton Lansley +3 more
doaj +1 more source
Vulnerability to social engineering in social networks : a proposed user-centric framework [PDF]
Social networking sites have billions of users who communicate and share their personal information every day. Social engineering is considered one of the biggest threats to information security nowadays.
Albladi, Samar, Weir, George R S
core +1 more source
Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in sight.
David Airehrour +2 more
doaj +1 more source
Social media user identity linkage by graphic content comparison [PDF]
The article proposes a new approach to comparing accounts of the social media “VKontakte” and “Instagram” to determine those accounts which belong to the same user.
Anastasia A. Korepanova +2 more
doaj +1 more source
Analysis of Recent Attacks Based on Social Engineering Techniques [PDF]
This paper attempts to strengthen the pursued research on social engineering (SE) threat identification, and control, by means of the author’s illustrated classification, which includes attack types, determining the degree of possible harm to each types ...
Korzhenko, O. Y., Sokolov, V. Y.
core +2 more sources

