نتایج جستجو برای: phishing attacks
تعداد نتایج: 58509 فیلتر نتایج به سال:
Phishing is an important security issue to the Internet, which has a significant economic impact. The main solution to counteract this threat is currently reactive blacklisting; however, as phishing attacks are mainly performed over short periods of time, reactive methods are too slow. As a result, new approaches to early identify malicious websites are needed. In this paper a new proactive dis...
In this paper we examine phishing emails received over a thirteen-year period and evaluate how they have changed on a number of characteristics. Using a dual-path model of persuasion, we categorize some characteristics as central (such as persuasiveness) and some as peripheral (such as message appearance), and hypothesize that both types of characteristics should be more prominent as phishing a...
To the extent that phishing has become a serious threat to information security, there has been rather limited theory-grounded research on this burgeoning phenomenon. In this paper, we develop a theoretical model of victimization by phishing based on the Heuristic eSystematic Model of information processing. We argue that the HeuristiceSystematic Model offers an ideal theoretical framework for ...
Phishing is a significant type of internet crime that tricks users into giving up their personal and financial information. To combat phishing, browser manufacturers, software vendors, and organizations have compiled repositories of phishing URLs (blacklists). These lists enable the analysis of reported phishing attacks to be shared among antiphishing communities to gain awareness of evolving p...
The latest report by Kaspersky on email Spam and targeted Phishing attacks, percentage, highlights the need of an urgent solution. Attachment-driven Spear-phishing struggles to succeed against many providers’ malware-filtration systems, which proactively check emails for malicious software. In this paper, we provided a solution that can detect attacks based required similarities in specific dom...
There are a billion Facebook users worldwide with some individuals spending 8 hours each day on the platform. Limited research has, however, explored the consequences of such overuse. Even less research has examined the misuse of social media by criminals who are increasingly using social media to defraud individuals through phishing-type attacks. The current study focuses on Facebook habits an...
Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. In this paper, we present a theoretical yet practical model to study this threat in a formal manner. While it is folklore knowledge that a successful phishing attack entails creating messages that are indistinguishable from the natural, expected messages by the intended victim, this concept has n...
Phishing attacks exploit human vulnerabilities. They play on our feelings of greed, our instinct to help others, or our need to protect what we have. Phishers often use the same social engineering strategies that con artists have used in the offline world for generations. And despite years of consumer education efforts, users continue to be scammed by offline con artists. In fact, in the first ...
These days, most of companies expanding their business horizon through dynamic web sites based on Web 2.0 concept. The JavaScript is a key choice of web developers to build sophisticated dynamic web 2.0 application such social network site, blogs, e-commerce websites. On the other hand vulnerable JavaScript code is also exploited by the hackers to launch the attacks. Hacker may tamper the JavaS...
Phishing is a particular type of cybercrime that allows criminals to trick people and steal crucial data. The phishing assault has developed into more complex attack vector since the first instance was published in 1990. currently one most prevalent types online fraud behavior. done using number methods, such as through emails, phone calls, instant chats, adverts, pop-up windows on websites, DN...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید