Results 21 to 30 of about 226,022 (290)

Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]

open access: yes, 2010
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher   +3 more
core   +1 more source

Protection against attacks using social engineering tools and methods

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2023
Objective.  In the modern world, innovative technologies are actively developing, communications are moving into the Internet space. Nevertheless, new technologies turned out to be in demand in the segment of organizations, individuals, cyber fraudsters ...
V. A. Repenko, S. A. Reznichenko
doaj   +1 more source

ANALYSIS OF USERS’ PROTECTION FROM SOCIO-ENGINEERING ATTACKS: SOCIAL GRAPH CREATION BASED ON INFORMATION FROM SOCIAL NETWORK WEBSITES [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2018
Subject of Research. The paper deals with accounts in social network websites as a source of information about the intensity of communication between employees in the team.
M. V. Abramov   +2 more
doaj   +1 more source

A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks [PDF]

open access: yes, 2015
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strategies to psychologically manipulate a user.
Heartfield, Ryan, Loukas, George
core   +2 more sources

Social Engineering Attack Strategies and Defence Approaches [PDF]

open access: yes2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), 2016
This paper examines the role and value of information security awareness efforts in defending against social engineering attacks. It categories the different social engineering threats and tactics used in targeting employees and the approaches to defend against such attacks.
Ghafir, I   +3 more
openaire   +2 more sources

SEADer++: social engineering attack detection in online environments using machine learning

open access: yesJournal of Information and Telecommunication, 2020
Social engineering attacks are one of the most well-known and easiest to apply attacks in the cybersecurity domain. Research has shown that the majority of attacks against computer systems was based on the use of social engineering methods.
Merton Lansley   +3 more
doaj   +1 more source

Vulnerability to social engineering in social networks : a proposed user-centric framework [PDF]

open access: yes, 2016
Social networking sites have billions of users who communicate and share their personal information every day. Social engineering is considered one of the biggest threats to information security nowadays.
Albladi, Samar, Weir, George R S
core   +1 more source

Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model

open access: yesInformation, 2018
Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in sight.
David Airehrour   +2 more
doaj   +1 more source

Social media user identity linkage by graphic content comparison [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2021
The article proposes a new approach to comparing accounts of the social media “VKontakte” and “Instagram” to determine those accounts which belong to the same user.
Anastasia A. Korepanova   +2 more
doaj   +1 more source

Analysis of Recent Attacks Based on Social Engineering Techniques [PDF]

open access: yes, 2018
This paper attempts to strengthen the pursued research on social engineering (SE) threat identification, and control, by means of the author’s illustrated classification, which includes attack types, determining the degree of possible harm to each types ...
Korzhenko, O. Y., Sokolov, V. Y.
core   +2 more sources

Home - About - Disclaimer - Privacy