نتایج جستجو برای: phishing attacks

تعداد نتایج: 58509  

2012
Samuel Marchal Jérôme François Radu State Thomas Engel

Phishing is an important security issue to the Internet, which has a significant economic impact. The main solution to counteract this threat is currently reactive blacklisting; however, as phishing attacks are mainly performed over short periods of time, reactive methods are too slow. As a result, new approaches to early identify malicious websites are needed. In this paper a new proactive dis...

2015
Albert L. Harris Dave Yates

In this paper we examine phishing emails received over a thirteen-year period and evaluate how they have changed on a number of characteristics. Using a dual-path model of persuasion, we categorize some characteristics as central (such as persuasiveness) and some as peripheral (such as message appearance), and hypothesize that both types of characteristics should be more prominent as phishing a...

Journal: :Computers & Security 2013
Xin Luo Wei Zhang Stephen D. Burd Alessandro F. Seazzu

To the extent that phishing has become a serious threat to information security, there has been rather limited theory-grounded research on this burgeoning phenomenon. In this paper, we develop a theoretical model of victimization by phishing based on the Heuristic eSystematic Model of information processing. We argue that the HeuristiceSystematic Model offers an ideal theoretical framework for ...

2015
Leah Zhang-Kennedy Elias Fares Sonia Chiasson Robert Biddle

Phishing is a significant type of internet crime that tricks users into giving up their personal and financial information. To combat phishing, browser manufacturers, software vendors, and organizations have compiled repositories of phishing URLs (blacklists). These lists enable the analysis of reported phishing attacks to be shared among antiphishing communities to gain awareness of evolving p...

Journal: :Computers & Electrical Engineering 2021

The latest report by Kaspersky on email Spam and targeted Phishing attacks, percentage, highlights the need of an urgent solution. Attachment-driven Spear-phishing struggles to succeed against many providers’ malware-filtration systems, which proactively check emails for malicious software. In this paper, we provided a solution that can detect attacks based required similarities in specific dom...

Journal: :J. Computer-Mediated Communication 2015
Arun Vishwanath

There are a billion Facebook users worldwide with some individuals spending 8 hours each day on the platform. Limited research has, however, explored the consequences of such overuse. Even less research has examined the misuse of social media by criminals who are increasingly using social media to defraud individuals through phishing-type attacks. The current study focuses on Facebook habits an...

2011
Narasimha Shashidhar Lei Chen Sam Houston

Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. In this paper, we present a theoretical yet practical model to study this threat in a formal manner. While it is folklore knowledge that a successful phishing attack entails creating messages that are indistinguishable from the natural, expected messages by the intended victim, this concept has n...

2007
Cynthia Kuo Bryan Parno Adrian Perrig

Phishing attacks exploit human vulnerabilities. They play on our feelings of greed, our instinct to help others, or our need to protect what we have. Phishers often use the same social engineering strategies that con artists have used in the offline world for generations. And despite years of consumer education efforts, users continue to be scammed by offline con artists. In fact, in the first ...

2012
Saurabh Jain Deepak Singh Tomar Divya Rishi Sahu

These days, most of companies expanding their business horizon through dynamic web sites based on Web 2.0 concept. The JavaScript is a key choice of web developers to build sophisticated dynamic web 2.0 application such social network site, blogs, e-commerce websites. On the other hand vulnerable JavaScript code is also exploited by the hackers to launch the attacks. Hacker may tamper the JavaS...

Journal: :E3S web of conferences 2023

Phishing is a particular type of cybercrime that allows criminals to trick people and steal crucial data. The phishing assault has developed into more complex attack vector since the first instance was published in 1990. currently one most prevalent types online fraud behavior. done using number methods, such as through emails, phone calls, instant chats, adverts, pop-up windows on websites, DN...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید