Mind your SMSes: Mitigating social engineering in second factor authentication
نویسندگان
چکیده
منابع مشابه
Mind your SMSes: Mitigating social engineering in second factor authentication
SMS-based second factor authentication is a cornerstone for many service providers, ranging from email service providers and social networks to financial institutions and online marketplaces. Attackers are not slow to capitalize on the vulnerabilities of this mechanism, using social engineering techniques to coerce users to forward authentication codes. We demonstrate one social engineering att...
متن کاملWhat's in your Mind?
Neuropsychologists have an advantage on us dry Cognitive Scientists: They always have impressive color slides of PET or MRI or fMRI images showing the exact location of whatever they wish to discuss — the soul or the locus of sinful thoughts or the center of consciousness. If one were to go by popular science articles on the brain one would have to conclude that we know where everything is loca...
متن کاملTowards Measuring and Mitigating Social Engineering Software Download Attacks
Most modern malware infections happen through the browser, typically as the result of a drive-by or social engineering attack. While there have been numerous studies on measuring and defending against drive-by downloads, little attention has been dedicated to studying social engineering attacks. In this paper, we present the first systematic study of web-based social engineering (SE) attacks th...
متن کاملMicrobes Manipulate Your Mind
Take Toxoplasma gondii, the single-celled parasite. When mice are infected by it, they suffer the grave misfortune of becoming attracted to cats. Once a cat inevitably consumes the doomed creature, the parasite can complete its life cycle inside its new host. Or consider Cordyceps, the parasitic fungus that can grow into the brain of an insect. The fungus can force an ant to climb a plant befor...
متن کاملChanging your mind.
When individuals detect an inconsistency in a set of propositions, they tend to change their minds about at least one proposition to resolve the inconsistency. The orthodox view from William James (1907) onward has been that a rational change should be minimal. We propose an alternative hypothesis according to which individuals seek to resolve inconsistencies by explaining their origins. We rep...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2017
ISSN: 0167-4048
DOI: 10.1016/j.cose.2016.09.009