Results 61 to 70 of about 226,022 (290)

Social Engineering and Inter-Device Eavesdropping Using SCRCPY for Spoofing and Sniffing

open access: yesSistemasi: Jurnal Sistem Informasi
The rapid development of technology opens up new avenues for cybercriminals to carry out acts of social engineering and eavesdropping between devices. Social engineering refers to manipulation, influence, or deception used to gain control of a computer ...
Anne Ivena Wijaya   +6 more
doaj   +1 more source

Social engineering and its impact via the internet [PDF]

open access: yes, 2006
Historically social engineering attacks were limited upon a single organisation or single individual at a time. The impact of the Internet and growth of E-Business has allowed social engineering techniques to be applied at a global level.
Leitch, Shona, Warren, Matthew
core   +1 more source

Exploiting metabolic adaptations to overcome dabrafenib treatment resistance in melanoma cells

open access: yesMolecular Oncology, EarlyView.
We show that dabrafenib‐resistant melanoma cells undergo mitochondrial remodeling, leading to elevated respiration and ROS production balanced by stronger antioxidant defenses. This altered redox state promotes survival despite mitochondrial damage but renders resistant cells highly vulnerable to ROS‐inducing compounds such as PEITC, highlighting redox
Silvia Eller   +17 more
wiley   +1 more source

Towards a metric for recognition-based graphical password security [PDF]

open access: yes, 2011
Recognition-based graphical password (RBGP) schemes are not easily compared in terms of security. Current research uses many different measures which results in confusion as to whether RBGP schemes are secure against guessing and capture attacks.
English, R., Poet, R.
core   +1 more source

COMP–PMEPA1 axis promotes epithelial‐to‐mesenchymal transition in breast cancer cells

open access: yesMolecular Oncology, EarlyView.
This study reveals that cartilage oligomeric matrix protein (COMP) promotes epithelial‐to‐mesenchymal transition (EMT) in breast cancer. We identify PMEPA1 (protein TMEPAI) as a novel COMP‐binding partner that mediates EMT via binding to the TSP domains of COMP, establishing the COMP–PMEPA1 axis as a key EMT driver in breast cancer.
Konstantinos S. Papadakos   +6 more
wiley   +1 more source

Pre‐analytical optimization of cell‐free DNA and extracellular vesicle‐derived DNA for mutation detection in liquid biopsies

open access: yesMolecular Oncology, EarlyView.
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen   +11 more
wiley   +1 more source

Socioeconomic Challenges of Social Engineering and Ensuring Cybersecurity in Mobile Device Use [PDF]

open access: yesSocioEconomic Challenges
This study investigates the implications of social engineering attacks on mobile device security in the UAE, situating these threats within broader socioeconomic challenges.
Shankar Subramanian   +4 more
doaj   +1 more source

Evaluation of in vitro toxicity of common phytochemicals included in weight loss supplements using 1H NMR spectroscopy

open access: yesFEBS Open Bio, EarlyView.
We investigated the toxicity of 12 active compounds commonly found in herbal weight loss supplements (WLS) using human liver and colon cell models. Epigallocatechin‐3‐gallate was the only compound showing significant toxicity. Metabolic profiling revealed protein degradation, disrupted energy and lipid metabolism suggesting that the inclusion of EGCG ...
Emily C. Davies   +3 more
wiley   +1 more source

AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures

open access: yes中国工程科学, 2021
 Artificial intelligence (AI) brings significant societal progress and it also revolutionizes the cybersecurity sector. Thus, studying the security problems induced by the deep fusion of AI and cyberspace security becomes significant. In this article, we
Fang Binxing   +3 more
doaj   +1 more source

Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats

open access: yes, 2019
Advanced persistent threats (APTs) are stealthy attacks which make use of social engineering and deception to give adversaries insider access to networked systems.
barrett   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy