Phishing
2,847 Followers
Recent papers in Phishing
Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities. Since most developers are not experienced software security practitioners, a solution for correctly fixing SQL injection vulnerabilities that does not... more
Phishing e-mails deceive individuals into giving out personal information which may then be utilized for identity theft. One particular type, the Personal Solicitation E-mail (PSE) mimics personal letters—modern perversions of ars... more
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure. These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most organizations rely on training to... more
Explained: Understand what Phishing Scams are, how to identify phishing email and 8 expert tips to keep you safe from phishing scams.
COVID-19 is a fatal disease caused by coronavirus. ‘CO’ signifies corona, ‘VI’ signifies virus, ‘D’ signifies disease. The COVID-19 virus is a new virus that belongs to the family of viruses as Severe Acute Respiratory Syndrome. In this... more
Tras años de trabajo, estudio e investigación, “Hackeados” llega al público. Un libro que, a diferencia del resto de los escritos por abogados, no está dirigido a otros abogados, sino al resto de los ciudadanos. En un lenguaje... more
The Coronavirus (COVID-19) crisis is having a massive impact globally with a rapid spread across the globe. Which made the World Health Organization declare it a pandemic. COVID-19 has prompted countries to adopt new behaviors such as... more
The researcher investigated the extent of involvement in Cybercrime activities among students’ in tertiary institutions in Enugu state of Nigeria using cross sectional survey design. Questionnaires were used for data collection. A sample... more
Phishing is a crime that involves the theft of personal information from users. Individuals, corporations, cloud storage, and government websites are all targets for the phishing websites. Anti-phishing technologies based on hardware are... more
The low cost of communication and internet technology empower the common man to access various services online. But, these services are under watch of attackers who are trying to trick the online user by misleading or fake URLs. The URL... more
Ingeniería Social implica valerse de cualquier medio para obtener información acerca de una o varias personas, para obtener beneficio o causar daño. No se asocia sólo a las acciones ejecutadas en línea, y se aprovecha de la credulidad de... more
In the present era of technology, cybercriminals are getting smarter day by day. From the past few years, the cybercrimes have increased to an extent that most of the big companies are finding it difficult to prevent cybercrimes. One such... more
Whilst studying mobile users’ susceptibility to phishing attacks, we found ourselves subject to regulations concerning the use of deception in research. We argue that such regulations are misapplied in a way that hinders the progress... more
In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has... more
In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has... more
Phishing is a scam that has evolved many years ago and it has been growing ever since. In this study we have collected much information regarding its new and improvised way of scamming the users without their knowledge and concern. Some... more
Fecha de Publicación: 4 de Octubre de 2017 1. INTRODUCCIÓN No es la primera vez que CESCO analiza el fenómeno del "phishing", contando con varios estudios sobre la materia 1. El presente trabajo es continuidad de ellos, pero podemos... more
Personal computers and computer networks began to take over offices and increasingly the public in the 1980s, but the extensive adoption of the Internet did not come about until the introduction of the first browsers and the over-... more
Cybersecurity is a global challenge as Cyberspace is never risk free. Cybersecurity ensures the attainment and maintenance of the security properties of the digital infrastructure and services against relevant security risks in the cyber... more
Internet users use the web every day for Browsing, Email, Banking, Social Media, and Web File & Video downloads. This research paper aims to help world internet users how not to get victimized to EMOTET malware-A Banking Credentials... more
Cyber security is a information technology. Securing information has become one of the biggest challenges nowadays. Whenever we think about cyber security the first thing we remember is 'Cyber Crime' which is been increasing day by day.... more
At present, the importance of data is increasing day by day. But with the increasing importance, the threat of data breach is also getting high. Recently in medical field, the hospitals are heading towards digitalization, but... more
Purpose-The emergence of the novel coronavirus (COVID-19) has threatened physical and mental health, and changed the behaviour and decision-making processes of individuals, organisations, and institutions worldwide. As many services move... more
Phishing remains a basic security issue in the cyberspace. In phishing, assailants steal sensitive information from victims by providing a fake site which looks like the visual clone of a legitimate site. Phishing shall be handled using... more