Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   8  
      Criminal LawInformation SecurityComputer SecurityCyber crime
    • by 
    •   4  
      NetworkWebsitePhishingComputer Applications
Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities. Since most developers are not experienced software security practitioners, a solution for correctly fixing SQL injection vulnerabilities that does not... more
    • by 
    •   11  
      Computer ScienceSoftware SecurityDatabasesSoftware Reliability
    • by 
    •   5  
      Information TechnologyIntellectual PropertyComputer SecurityData Security
Phishing e-mails deceive individuals into giving out personal information which may then be utilized for identity theft. One particular type, the Personal Solicitation E-mail (PSE) mimics personal letters—modern perversions of ars... more
    • by 
    •   3  
      RhetoricTeaching Writing with emailPhishing
    • by 
    •   13  
      Computer ScienceDesignHuman FactorsSecurity
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure. These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most organizations rely on training to... more
    • by 
    •   6  
      Computer ScienceSocial EngineeringPhishingSecurity Risks
Explained: Understand what Phishing Scams are, how to identify phishing email and 8 expert tips to keep you safe from phishing scams.
    • by 
    •   13  
      Information SecurityNetwork SecurityInternational SecuritySecurity
    • by 
    •   4  
      ClusteringPhishingGraph PartitioningProfiling
    • by 
    •   14  
      Image ProcessingSecurityCryptographyImage Reconstruction
    • by 
    •   8  
      Computer SciencePrivacyVideoRisk
COVID-19 is a fatal disease caused by coronavirus. ‘CO’ signifies corona, ‘VI’ signifies virus, ‘D’ signifies disease. The COVID-19 virus is a new virus that belongs to the family of viruses as Severe Acute Respiratory Syndrome. In this... more
    • by 
    •   6  
      Cyber SecurityPhishingCybercriminalsCoronavirus
Tras años de trabajo, estudio e investigación, “Hackeados” llega al público. Un libro que, a diferencia del resto de los escritos por abogados, no está dirigido a otros abogados, sino al resto de los ciudadanos. En un lenguaje... more
    • by 
    •   13  
      Criminal LawCybercrimesFraud Detection And PreventionCyberbullying
The Coronavirus (COVID-19) crisis is having a massive impact globally with a rapid spread across the globe. Which made the World Health Organization declare it a pandemic. COVID-19 has prompted countries to adopt new behaviors such as... more
    • by 
    •   15  
      UsabilityCybercrimesPrivacyBiometrics
The researcher investigated the extent of involvement in Cybercrime activities among students’ in tertiary institutions in Enugu state of Nigeria using cross sectional survey design. Questionnaires were used for data collection. A sample... more
    • by 
    •   3  
      CybercrimeStalkingPhishing
    • by 
    •   12  
      XMLWeb ServicesDistributed SystemsSql Injection
    • by 
    •   4  
      Computer SoftwarePhishingIdentity TheftWeb Pages
    • by 
    •   8  
      Information SecurityMachine LearningData MiningFuzzy Logic
    • by 
    •   7  
      Information SecurityComputer SecurityDeceptionSocial Engineering
Phishing is a crime that involves the theft of personal information from users. Individuals, corporations, cloud storage, and government websites are all targets for the phishing websites. Anti-phishing technologies based on hardware are... more
    • by 
    •   4  
      Neural NetworkPhishingPhishing AttacksIT security phishing and spoofing
In the last few years, many fake websites have developed on the World Wide Web to harm users by stealing their confidential information such as account ID, user name, password, etc. Phishing is the social engineering attacks and currently... more
    • by  and +1
    •   13  
      Computer ScienceInformation TechnologyTechnologyNetwork Security
The low cost of communication and internet technology empower the common man to access various services online. But, these services are under watch of attackers who are trying to trick the online user by misleading or fake URLs. The URL... more
    • by 
    •   5  
      FraudCyber SecurityPhishingURL
Ingeniería Social implica valerse de cualquier medio para obtener información acerca de una o varias personas, para obtener beneficio o causar daño. No se asocia sólo a las acciones ejecutadas en línea, y se aprovecha de la credulidad de... more
    • by 
    •   5  
      PhishingRed SocialSocial NetworkIngeniería Social
In the present era of technology, cybercriminals are getting smarter day by day. From the past few years, the cybercrimes have increased to an extent that most of the big companies are finding it difficult to prevent cybercrimes. One such... more
    • by 
    •   5  
      Computer NetworksLogistic RegressionRandom ForestPhishing
Phishing is a fraudulent process or an attempt to steal one's personal information. Phishing usually occurs via email or by portraying website as a legitimate one. In order to stop the phishing attempt we have to find or recognize the... more
    • by  and +1
    •   16  
      MathematicsComputer ScienceAlgorithmsInformation Technology
Whilst studying mobile users’ susceptibility to phishing attacks, we found ourselves subject to regulations concerning the use of deception in research. We argue that such regulations are misapplied in a way that hinders the progress... more
    • by 
    •   5  
      LawEthicsSecurity StudiesPhishing
In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has... more
    • by 
    •   15  
      Network SecurityWireless Sensor Network SecurityCyber crimeMalware
    • by 
    •   5  
      PrivacyPersonalizationPharmingPhishing
In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has... more
    • by 
    •   15  
      Network SecurityWireless Sensor Network SecurityCyber crimeMalware
    • by 
    •   6  
      Human FactorsAgency TheorySocial EngineeringIEEE
Phishing is a scam that has evolved many years ago and it has been growing ever since. In this study we have collected much information regarding its new and improvised way of scamming the users without their knowledge and concern. Some... more
    • by 
    •   13  
      Cyber crimeCybersecurityInternet and web securityInternet scams
Fecha de Publicación: 4 de Octubre de 2017 1. INTRODUCCIÓN No es la primera vez que CESCO analiza el fenómeno del "phishing", contando con varios estudios sobre la materia 1. El presente trabajo es continuidad de ellos, pero podemos... more
    • by 
    •   2  
      PhishingMedios de Pago
    • by 
    •   3  
      Cyber crimeCyber LawPhishing
    • by 
    •   7  
      Information SecurityFacebookComputer SecurityMedia
Personal computers and computer networks began to take over offices and increasingly the public in the 1980s, but the extensive adoption of the Internet did not come about until the introduction of the first browsers and the over-... more
    • by 
    •   23  
      PsychoanalysisSocial PsychologyGeographyCommunication
    • by 
    •   7  
      Computer ScienceMobile TechnologySystem of SystemsPhishing
    • by 
    •   23  
      PsychoanalysisSocial PsychologyGeographyCommunication
Cybersecurity is a global challenge as Cyberspace is never risk free. Cybersecurity ensures the attainment and maintenance of the security properties of the digital infrastructure and services against relevant security risks in the cyber... more
    • by 
    •   10  
      Secure Software DevelopmentCybersecurityMalwareWebGIS
    • by 
    •   3  
      PhishingOnline BankingPenegakan Hukum
With employees being still the weakest link in organizational information security, phishing studies are becoming increasingly important and are more frequently employed as a research method. Ensuring the validity of results often calls... more
    • by  and +1
    •   3  
      EthicsPhishingDeception in research
    • by 
    •   6  
      Information SecurityNetwork SecurityComputer SecurityPhishing
Internet users use the web every day for Browsing, Email, Banking, Social Media, and Web File & Video downloads. This research paper aims to help world internet users how not to get victimized to EMOTET malware-A Banking Credentials... more
    • by 
    •   6  
      MalwareCyber SecurityPhishingIT Security
    • by 
    •   6  
      HackingCybercrimePhishingCybersquatting
    • by 
    •   6  
      FraudPhishingWhite collar fraudDolandırıcılık
    • by 
    •   3  
      PhishingCyber StalkingComnputer
Cyber security is a information technology. Securing information has become one of the biggest challenges nowadays. Whenever we think about cyber security the first thing we remember is 'Cyber Crime' which is been increasing day by day.... more
    • by 
    •   5  
      Computer SecurityMalwareVirusesPhishing
At present, the importance of data is increasing day by day. But with the increasing importance, the threat of data breach is also getting high. Recently in medical field, the hospitals are heading towards digitalization, but... more
    • by 
    •   7  
      Data AnalysisDatabasesAgile Methods (Software Engineering)Scrum and Agile
Purpose-The emergence of the novel coronavirus (COVID-19) has threatened physical and mental health, and changed the behaviour and decision-making processes of individuals, organisations, and institutions worldwide. As many services move... more
    • by 
    •   15  
      CriminologyIdentity Fraud/TheftCyber crime419 Scams
Phishing remains a basic security issue in the cyberspace. In phishing, assailants steal sensitive information from victims by providing a fake site which looks like the visual clone of a legitimate site. Phishing shall be handled using... more
    • by 
    •   4  
      Internet SecurityCyber crimeSocial EngineeringPhishing