نتایج جستجو برای: phishing attacks

تعداد نتایج: 58509  

2010
Kenneth G. Paterson Douglas Stebila

To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time password...

2006
Amir Herzberg

Web users are increasingly victims of phishing, spoofing and malware attacks. In this article, we discuss existing and proposed defense mechanisms. We highlight the vulnerabilities of current defenses, and the challenges of validating and adopting new defenses.

Journal: : 2023

The definition and types of phishing are determined. specifics the attacks were detailed. procedural technological issues in relation to have been clarified. algorithm for detecting bad emails has reviewed. traditional methods countering shown. general recommendations made prevent phishing. directions improvement national legislation with aim strengthening powers state combat proposed.

Journal: :Journal of the Korea Institute of Information and Communication Engineering 2013

Journal: :International Journal of Power Electronics and Drive Systems 2023

In this observational quasi-experimental study, we recruited 200 participants during the Federal University of Petroleum Resources Effurun’s (FUPRE) orientation, who were exposed to socially engineered (phishing) attacks over nine months. Attacks sought extract participants’ data and/or entice them click (compromised) links. The study aims determine phishing exposure and risks among undergradua...

Journal: :PeerJ PrePrints 2017
Ibrahim Ghafir Mohammad Hammoudeh Vaclav Prenosil

Advanced Persistent Threat (APT) is one of the most serious types of cyber attacks, which is a new and more complex version of multi-step attack. Within the APT life cycle, the most common technique used to get the point of entry is spear-phishing emails which may contain disguised executable files. This paper presents the disguised executable file detection (DeFD) module, which aims at detecti...

2018
Prashanth Rajivan Cleotilde Gonzalez

Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید