Results 41 to 50 of about 226,022 (290)
Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK
Cyber adversaries have increasingly leveraged social engineering attacks to breach large organizations and threaten the well-being of today's online users.
Bittleston, Daniel +7 more
core +1 more source
Social Engineering a General Approach [PDF]
Social engineering is considered to be a taboo subject in nowadays society. It involves the use of social skills or to obtain usernames, passwords, credit card data, or to compromise or altering the information and systems of an entity.
Valerica GREAVU-SERBAN, Oana SERBAN
doaj +1 more source
Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering
This paper aims to provide an overview of social engineering attacks, and their impacts on cybersecurity, including national and international security, and figures out detection techniques, and major methods for countermeasure. How do social engineering
Amal Alhosban, Nezir Akyeşilmen
doaj +1 more source
Social engineering attack detection model: SEADM [PDF]
Social engineering is a real threat to industries in this day and age even though the severity of it is extremely downplayed. The difficulty with social engineering attacks is mostly the ability to identify them. Social engineers target call centre employees, as they are normally underpaid, under skilled workers whom have limited knowledge about the ...
Monique Bezuidenhout +2 more
openaire +1 more source
Deriving Quantitative Metrics to Assess Social Engineering Attack Risks: An Expert Survey
Social engineering attacks are one of the biggest security threats IT organizations are facing today. To protect themselves against IT risks, organizations typically use quantitative assessment frameworks to identify the biggest risks they face and ...
Daniel Rosenberger +2 more
doaj +1 more source
The Design and Evaluation of an Interactive Social Engineering Training Programme [PDF]
Social engineering is a major issue affecting organisational security. Educating employees on how to avoid social engineering attacks is important because social engineering tries to penetrate an organisation by using employees to grant authorized ...
Alkhamis, Esra, Renaud, Karen
core
Advanced Social Engineering Attack Techniques
Abstract: This paper explains the emergence of Social Engineering techniques that can be deadly and effective and are being heavily watched by the Department of Defense and the FBI. The increased use of the Internet and cell phones has made it possible for most people to communicate, surf the web, or transfer data anywhere in the world.
openaire +1 more source
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley +1 more source
الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتأثیرها على المجتمع العربى [PDF]
The present study aims at recognizing to extreme the Arab community isaware of how to protect their personal accounts and ways of penetration(hacking) of privacy on general level and focusing on social engineering onparticular.
د. مها أحمد ابراهیم محمد
doaj +1 more source
A New Role for Human Resource Managers: Social Engineering Defense [PDF]
[Excerpt] The general risk of social engineering attacks to organizations has increased with the rise of digital computing and communications, while for an attacker the risk has decreased.
Seidenberger, Scott
core +1 more source

