نتایج جستجو برای: phishing attacks

تعداد نتایج: 58509  

Journal: :CoRR 2018
Belal Amro

The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to performing critical and sensitive tasks like money payments. Since the mobile device is accompanying a person most of his time, it is highly p...

2009
Xi Chen Indranil Bose Alvin Chung Man Leung Chenhui Guo

We assess the severity of phishing attacks in terms of their risk levels and the potential loss in market value to the firms. We analyze 1,030 phishing alerts released on a public database as well as financial data related to the targeted firms using a hybrid text and data mining method that predicts the severity of the attack with high accuracy. Our research identifies the important textual an...

2014
Seoung Yeop Na Hyun Kim Dong Hoon Lee

With the rise of Internet banking, phishing has become a major problem in online banking systems. Over time, highly evolved phishing attacks, such as active phishing, have emerged as a serious issue. Thus, we suggest two server authentication schemes based on SSL/TLS to protect Internet banking customers from phishing attacks. The first scheme uses the X.509 client certificate, which includes a...

Journal: :CoRR 2016
T. T. Dayaratne

Though the rapid development and spread of Information and Communication Technology (ICT) making people's life much more easier, on the other hand it causing some serious threats to the society. Phishing is one of the most common cyber threat, that most users falls in. This research investigate on QR code based phishing attacks which is a newly adopted intrusive method and how to enhance the aw...

2016
James W. Ragucci Stefan A. Robila

Fraudulent e-mails, known as phishing attacks, have brought chaos across the digital world causing billions of dollars of damage. These attacks are known for their ability to exploit the human aspect of a computer system by pretending to originate from a source trusted by the victim. While technology defenses have been setup for protection, people are still succumbing to these attacks at alarmi...

Journal: :CoRR 2012
P. Thiyagarajan G. Aghila V. Prasanna Venkatesan

In spite of existence of many standard security mechanisms for ensuring secure eCommerce business, users still fall prey for online attacks. One such simple but powerful attack is ‘Phishing’. Phishing is the most alarming threat in the e-Commerce world and effective anti-phishing technique is the need of the hour. This paper focuses on a novel anti-phishing browser plug-in which uses informatio...

Journal: :Future Generation Comp. Syst. 2012
Hossain Shahriar Mohammad Zulkernine

Phishing attacks allure website users to visit fake web pages and provide their personal information. However, testing of phishing websites is challenging. Unlike traditional web-based program testing, we do not know the response of form submissions in advance. There exists lack of efforts to help anti-phishing professionals who manually verify a reported phishing site and take further actions....

2011
Ram Avtar Bhumica Verma Ajay Jangra

The World Wide Web provides every internet citizen with voluminous and heterogeneous data. Therefore, it becomes an essential to mine this available data to make it presentable, useful, and pertinent to a particular problem. Web mining deals with the extraction of these interesting patterns and developing useful abstracts from diversified sources. To improve the security of Web services one wou...

2017
Matthew L. Jensen Alexandra Durcikova Ryan T. Wright

This paper explores how an organization can utilize its employees to combat phishing attacks collectively through coordinating their activities to create a human firewall. We utilize knowledge management research on knowledge sharing to guide the design of an experiment that explores a central reporting and dissemination platform for phishing attacks. The 2x2 experiment tests the effects of pub...

2011
Fadi Thabatah Keshav Dahal

Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value. The problem of social engineering attack is that there is no single solution to eliminate it completely, since it deals largely with the human factor. This is why implementing empirical...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید