114 Hits in 5.4 sec

Phishing Attacks: A Recent Comprehensive Study and a New Anatomy

Zainab Alkhalil, Chaminda Hewage, Liqaa Nawaf, Imtiaz Khan
2021 Frontiers in Computer Science  
Moreover, the proposed anatomy will help readers understand the process lifecycle of a phishing attack which in turn will increase the awareness of these phishing attacks and the techniques being used;  ...  Phishing is an example of a highly effective form of cybercrime that enables criminals to deceive users and steal important data.  ...  Domain Name System Based Phishing (Pharming) Any form of phishing that interferes with the domain name system so that the user will be redirected to the malicious website by polluting the user's DNS cache  ... 
doi:10.3389/fcomp.2021.563060 fatcat:4pk6kcegebethm2anvwjdq7q4q

Defending against Phishing Attacks: Taxonomy of Methods, Current Issues and Future Directions [article]

B. B. Gupta, Nalin Asanka Gamagedara Arachchilage, Konstantinos E. Psannis
2017 arXiv   pre-print
Second, we will provide taxonomy of various solutions proposed in literature to protect users from phishing based on the attacks identified in our taxonomy.  ...  It is therefore very important that organisations to pay attention to end-user awareness in phishing threat prevention. Therefore, the aim of our paper is twofold.  ...  After the classification, we also described various issues and challenges in current solutions to understand the idea for future study to help the humanity by defending against phishing attacks.  ... 
arXiv:1705.09819v1 fatcat:z42kdxukuff3pnstwdth2klgem

Designing ethical phishing experiments

Markus Jakobsson, Jacob Ratkiewicz
2006 Proceedings of the 15th international conference on World Wide Web - WWW '06  
the user perception of the experiment different from the user perception of the attack.  ...  At the same time, an experiment is accurate if it is possible to argue why its success rate is not an upper or lower bound of that of a real attack -this may be difficult if the ethics considerations make  ...  This can be interpreted in two ways: either the similarity in domain of the apparent sender gave these user confidence that the site would be safe to visit, or the numbers by Gartner are severe underestimates  ... 
doi:10.1145/1135777.1135853 dblp:conf/www/JakobssonR06 fatcat:54iyerz2kjavhobajtlhtvggsq

Security technologies go phishing

D. Geer
2005 Computer  
In one type of attack, phishers send IM users a message with a link to a fake Web site.  ...  "The majority of phishing Web sites are only semi-believable, and users are T e c h n o l o g y N e w s It appears that phishing will be a war of attacks and counterattacks. starting to see through them  ... 
doi:10.1109/mc.2005.201 fatcat:svgf4aw2fjguplyo5ltilhggr4

Evaluating user vulnerabilities vs phisher skills in spear phishing

Mathew Nicho, Hussein Fakhry, Uche Egbue
2018 IADIS International Journal on Computer Science and Information System  
This raises the main question of which construct (user vulnerabilities or phisher skills) has a greater influence on the vulnerable user.  ...  out the major factors that lead to computer users biting the phishers' bait.  ...  However, the question of why the email passes through under the very eyes of unsuspecting computer users can partly be ascertained by observing the methods deployed by spear phishers in crafting the email  ... 
doi:10.33965/ijcsis_2018130207 fatcat:bi5iombue5dbrpd6tc55ugj2ay

Investigation of phishing to develop guidelines to protect the Internet consumer's identity against attacks by phishers

R. Butler
2005 South African Journal of Information Management  
If the privacy policy is not displayed or the user is unable to understand it, he or she should consider doing business elsewhere.  ...  Use up-to-date spam filter and anti-virus software, in order to reduce the number of fraudulent and malicious e-mails to which you might otherwise be exposed.  ...  Articles published in SAJIM are the opinions of the authors and do not necessarily reflect the opinion of the Editor, Board, Publisher, Webmaster or the Rand Afrikaans University.  ... 
doi:10.4102/sajim.v7i3.269 fatcat:2ynp3viewrfqnchjgr4r3kx6ia

PhiGARo: Automatic Phishing Detection and Incident Response Framework

Martin Husak, Jakub Cegan
2014 2014 Ninth International Conference on Availability, Reliability and Security  
Although PhiGARo processes the phishing incidents automatically, it depends on reports of phishing incidents from users.  ...  There is a need to propagate e-mail addresses of a honeypot to attract phishers.  ...  First type of such messages contained subjects related to recent news to catch the reader's attention. The links then redirected user to a malicious websites.  ... 
doi:10.1109/ares.2014.46 dblp:conf/IEEEares/HusakC14 fatcat:2q637rwncbegtjrbo3irocheva

ViWiD : Visible Watermarking Based Defense Against Phishing [chapter]

Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, Cristina Nita-Rotaru
2005 Lecture Notes in Computer Science  
The watermark message is designed to be unique for every user and carries a shared secret between the company and the user in order to thwart the "one size fits all" attacks.  ...  The main challenge in visible watermarking of logo images is to maintain the aesthetics of the watermarked logo to avoid damage to its marketing purpose yet be able to insert a robust and readable watermark  ...  Acknowledgments The authors would like to thank Chris Baker, Umut Topkara, Eugene Lin, Prathima Rao, Ardalan Kangarlou-Haghigh and Saraju Mohanty for their helpful comments.  ... 
doi:10.1007/11551492_36 fatcat:baplpfthrfac7akd4ywx3vrszi

Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application

Samuel Marchal, Giovanni Armano, Tommi Grondahl, Kalle Saari, Nidhi Singh, N. Asokan
2017 IEEE transactions on computers  
While the state-of-the-art solutions have reasonably good performance, they suffer from several drawbacks including potential to compromise user privacy, difficulty of detecting phishing websites whose  ...  It relies on modeling inherent phisher limitations stemming from the constraints they face while building a webpage.  ...  ACKNOWLEDGMENTS This work was supported in part by the Academy of Finland (grant 274951) and Intel Collaborative Research Center for Secure Computing (ICRI-SC).  ... 
doi:10.1109/tc.2017.2703808 fatcat:dmyazcwd7fd7phg3l4baqxeuqq

What is this URL's Destination? Empirical Evaluation of Users' URL Reading

Sara Albakry, Kami Vaniea, Maria K. Wolters
2020 Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems  
Participants were strongly biased towards answering that the URL would lead to the website of the organization whose name appeared in the URL, regardless of its position in the URL structure.  ...  Common anti-phishing advice tells users to mouse over links, look at the URL, and compare to the expected destination, implicitly assuming that they are able to read the URL.  ...  ACKNOWLEDGMENTS We want to thank the members of the TULiPS lab for their feedback on survey design. We also thank our anonymous reviewers for their insightful comments.  ... 
doi:10.1145/3313831.3376168 dblp:conf/chi/AlbakryVW20 fatcat:csumvbfqinam7kule45mev3fpm

Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits

Frank L. Greitzer, Jeremy R. Strozer, Sholom Cohen, Andrew P. Moore, David Mundie, Jennifer Cowley
2014 2014 IEEE Security and Privacy Workshops  
Organizations often suffer harm from individuals who bear no malice against them but whose actions unintentionally expose the organizations to risk-the unintentional insider threat (UIT).  ...  We report on our efforts to collect and analyze data from UIT social engineering incidents to identify possible behavioral and technical patterns and to inform future research and development of UIT mitigation  ...  CERT ® is a registered mark of Carnegie Mellon University. DM-0000592  ... 
doi:10.1109/spw.2014.39 dblp:conf/sp/GreitzerSCMMC14 fatcat:evihrggzj5gwpns2tisrij5yje

Security Threats of URL Shortening: A User's Perspective

Nhien-An Le- Khac, M. Tahar Kechadi
2015 Journal of Advances in Computer Networks  
Thus the aim of this paper is to cover the existing knowledge gap and to compile a baseline assessment on the frequency of use, user confidence and user awareness when utilizing short URLs.  ...  However, although current research in literature has compiled addressing the security threats when utilizing such types of URLs, no study approached the assessment of user confidence and user awareness  ...  ACKNOWLEDGMENT This research is conducted by one of the MSc FCCI students, any comment or feedback please contact or  ... 
doi:10.7763/jacn.2015.v3.169 fatcat:so46viaylvbl3csjsj5btc4sda

Detecting visually similar Web pages

Teh-Chung Chen, Scott Dick, James Miller
2010 ACM Transactions on Internet Technology  
The scam begins when a malicious payload is sent to a user (often an email asking the user to login to one of their accounts).  ...  When a user is tricked into visiting a Phishing page, they can be fooled into inputting their account credentials, which are then stolen by the Phisher.  ...  Phishing mechanism is an absolute necessity in the trend of the Anti-Phishing tool development.  ... 
doi:10.1145/1754393.1754394 fatcat:3fsxye6xzrgvnd76ria3lozdze

Susceptibility to Phishing on Social Network Sites: A Personality Information Processing Model

Edwin Donald Frauenstein, Stephen Flowerday
2020 Computers & security  
This is because phishers are able to use similar methods to entice social network users to click on malicious links masquerading as fake news, controversial videos and other opportunities thought to be  ...  SNSs are a phisher's "market" as they offer phishers a wide range of targets and take advantage of opportunities that exploit the behavioural vulnerabilities of their users.  ...  Like phishing emails on SNSs phishers exploit the technical features offered, creating fake accounts and distributing malicious content ( Fire et al., 2014 ) .  ... 
doi:10.1016/j.cose.2020.101862 pmid:32501314 pmcid:PMC7252086 fatcat:7mnfi522ffcqdfk7s4qatevuiq

Privacy Issues and Solutions in Social Network Sites

Xi Chen, Katina Michael
2012 IEEE technology & society magazine  
Acknowledgements The work was supported in part by the National Natural Science  ...  SNS are the perfect organization that phishers want to pretend to be.  ...  do not understand the privacyrelated consequences of their behaviors.  ... 
doi:10.1109/mts.2012.2225674 fatcat:32g3gcy3rzck3lyc4irrsxz4j4
« Previous Showing results 1 — 15 out of 114 results