298 Hits in 2.8 sec

SOK: A Comprehensive Reexamination of Phishing Research from the Security Perspective [article]

Avisha Das, Shahryar Baki, Ayman El Aassal, Rakesh Verma, Arthur Dunbar
2019 arXiv   pre-print
We explain these challenges and then survey the existing phishing/spear phishing solutions in their light.  ...  Phishing and spear-phishing are typical examples of masquerade attacks since trust is built up through impersonation for the attack to succeed.  ...  Previous phishing studies have found that phishing is "far more successful than commonly thought" and it is the main mechanism for manual account hijacking [1] , [6] .  ... 
arXiv:1911.00953v1 fatcat:2bxxhd4qdfcrljinmicjjs2vt4

Don't click: towards an effective anti-phishing training. A comparative literature review

Daniel Jampen, Gürkan Gür, Thomas Sutter, Bernhard Tellenbach
2020 Human-Centric Computing and Information Sciences  
Attackers then use the phished data to execute their schemes further.  ...  Unfortunately, it is also often exploited for phishing attacks. To defend against such threats, many organizations have begun to provide anti-phishing training programs to their employees.  ...  The 2015 Sony Inc. hack is an example of a successful phishing campaign and demonstrates the extent of the damage that such an attack can cause [4] .  ... 
doi:10.1186/s13673-020-00237-7 fatcat:rwswgxy7kfdtnbloyoanbcx4wy

Outcomes of studying the autonomous hacking system Mechanical Phish [article]

Αλέξανδρος Ζαρκαδούλας, Alexandros Zarkadoulas, University Of Piraeus, Χριστόφορος Νταντογιάν, Christoforos Dadoyan
Επίσης, αυτή η εργασία είχε ως στόχο την επίδειξη των κύριων εργαλείων του Mechanical Phish.  ...  Στην εργασία αυτή, ασχολήθηκα με τις τεχνικές ανάλυσης ευπαθειών, την συμβολική εκτέλεση και το Mechanical Phish.  ...  Existing tools In 2015 Springfield was founded and became the first commercial cloud fuzzing service that Mechanical Phish Mechanical Phish 23 As we can see, the binary takes one argument that must  ... 
doi:10.26267/unipi_dione/88 fatcat:xwvfxyv3snf77ojwjn7izxmwgy

Understanding the Phishing Ecosystem [article]

Sophie Le Page, University, My, University, My
In "phishing attacks", phishing websites mimic trustworthy websites in order to steal sensitive information from end-users.  ...  We find that the efforts against phishing attacks are stronger than those against malware attacks.We also find phishing activity indicating that mitigation strategies are not taking down phishing websites  ...  [41] performed an exploratory study on Bitly's spam URL and account detection mechanism to expose the gaps in security mechanisms.  ... 
doi:10.20381/ruor-23629 fatcat:wqsnxhbeqngnxm367kikhwdx5a

Rampant Smoothing (RTS) Algorithm: an optimized consensus mechanism for private Blockchain enabled technologies

Usman Tariq
2022 EURASIP Journal on Wireless Communications and Networking  
AbstractBlockchain is a distributed database method of storing electronic information in digital form that makes it challenging to transform, hack, or rogue the system.  ...  To prove the validity of submitted data, a consensus mechanism is required, which was attained by implementing a novel 'Rampant Smoothing Algorithm' that was encoded using Solidity (i.e., aimed at developing  ...  This feature is curricular to identify and blacklist any frequent adversarial behavioral (i.e., phishing, bitpoint hack, bugs (associated with 'replication and consensus, validity, agreement, termination  ... 
doi:10.1186/s13638-022-02123-5 fatcat:bmcooqnifjfp7p34bodce4djsi

Next Generation Resilient Cyber-Physical Systems [article]

Michel Barbeau, Georg Carle, Joaquin Garcia-Alfaro, Vicenç Torra
2019 arXiv   pre-print
Two key challenges are understanding and reinforcing the resilience of CPS.  ...  Hacking and failures of such systems have impact on critical services with potentially significant and lasting consequences.  ...  Remote control of navigation systems, including successful hacking of autonomous cars and avionic systems.  ... 
arXiv:1907.08849v3 fatcat:ncjycpzrnnfz7hjd74g2quwvx4

Avoiding the internet of insecure industrial things

Lachlan Urquhart, Derek McAuley
2018 Computer Law and Security Review  
Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase.  ...  Addressing ICS hacks.  ...  Autonomous systems in logistics -smart oil tankers Use of autonomous systems in logistics is a clear application area for the industrial IoT.  ... 
doi:10.1016/j.clsr.2017.12.004 fatcat:aay53nzg2za4lluc6oynuiylna

The (In)Security of Smart Cities: Vulnerabilities, Risks, Mitigation, and Prevention

Rob Kitchin, Martin Dodge
2017 The Journal of urban technology  
Update sent without encryption Updates not signed Update location writable Update verification Malicious update Missing update mechanism No manual update mechanism Device Firmware Hardcoded  ...  IoT refers to the connecting together of machine-readable, uniquely identifiable objects through the Internet such that they can communicate largely autonomously and automatically.  ... 
doi:10.1080/10630732.2017.1408002 fatcat:wergb3uscbechmo4bszpnrxtgm

Legislative Developments in Cybersecurity in the EU

Faye F. Wang
2020 Amicus Curiae  
For example, the computer system of a driverless, autonomous or self-driving car may communicate various attributes to a central server to improve autonomous system performance for all other cars made  ...  In some countries, sandbox mechanisms or frameworks are regulated through national Fintech laws.  ... 
doi:10.14296/ac.v1i2.5131 fatcat:dwlk646mvrcrjbxvx5ykqrv6y4

IoT Technological Development: Prospect and Implication for Cyberstability

Syarulnaziah Anawar, Nurul Azma, Mohd Zaki, Zulkiflee Muslim, Norharyati Harum, Rabiah Ahmad
2019 International Journal of Advanced Computer Science and Applications  
Many cases of data and identity theft through hacked vehicles and hacked smart refrigerators have been previously reported.  ...  DNSSec acts as a security mechanism to avoid Internet users being redirected to fraudulent websites [10] .  ... 
doi:10.14569/ijacsa.2019.0100256 fatcat:i5ixhdo43bafpej2bvx3gkcudq

Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions

Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova
2019 IEEE Access  
In this study, we provide a review of forensics and deep learning mechanisms employed to investigate botnets and their applicability in the IoT environments.  ...  Prior to the appearance of the IoT domain, specialized digital forensics mechanisms were developed, in order to investigate Botnet activities in small-scale systems.  ...  There are various hacking techniques used by botnets, including Distributed Denial of Service attacks (DDoS), Keylogging, Phishing, Spamming, Click fraud, Identity theft and even the proliferation of other  ... 
doi:10.1109/access.2019.2916717 fatcat:a3w7kzvdlvh3hcjqri3uoyqsbu

A systems and control perspective of CPS security

Seyed Mehran Dibaji, Mohammad Pirani, David Bezalel Flamholz, Anuradha M. Annaswamy, Karl Henrik Johansson, Aranya Chakrabortty
2019 Annual Reviews in Control  
Based on [35] , two thirds of attacks have been initiated by phishing emails.  ...  Maroochy is also an outcome of the lack of detection and resilience mechanisms [25] .  ... 
doi:10.1016/j.arcontrol.2019.04.011 fatcat:wvg2nfbz4jexfe6ev26fv7aezm

Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends [article]

Elochukwu Ukwandu, Mohamed Amine Ben Farah, Hanan Hindy, Miroslav Bures, Robert Atkinson, Christos Tachtatzis, Xavier Bellekens
2021 arXiv   pre-print
The integration of Information and Communication Technology (ICT) tools into mechanical devices found in aviation industry has raised security concerns.  ...  The segment of the aviation industry commonly attacked is the Information Technology infrastructure, and the prominent type of attacks is malicious hacking activities that aim at gaining unauthorised access  ...  C [38] 2019 Phishing attack New Zealand A phishing attack targeted at Air New Zealand Airpoints customers.  ... 
arXiv:2107.04910v1 fatcat:nbcxe3x75rdqdk3o2r64oeatfq

CAVs Cybersecurity threats digest and analysis

S. Steinhorst, J. Lauinger, N.A. Nijdam, A. Collen, A. Zacharaki, M. Aslam
2019 Zenodo  
cybersecurity environment aiming to provide explicit, reproducible and auditable methodology for evaluating and interpreting all available research relating to the particular topic of cybersecurity in CAVs, autonomous  ...  It is vital to enact security design principles, to obtain the maximum resilience against cyberattacks and build a multi-layered defence mechanism.  ...  Some of the cyber-attacks on autonomous vehicles that occurred in the past years are, as we can see in the Figure 1 : • In 2016 and 2017 Tesla vehicles were subject to attack when one of the hackers hacked  ... 
doi:10.5281/zenodo.4728214 fatcat:fonojcfo6fdzbnc7oz6w66zoh4

Cybersecurity Challenges in the Maritime Sector

Frank Akpan, Gueltoum Bendiab, Stavros Shiaeles, Stavros Karamperidis, Michalis Michaloliakos
2022 Network  
In this section, we investigate cyberattacks on modern and autonomous ships based on the already hacked automation systems and actual incidents.  ...  Luckily, the hack attempt was successfully defended, and "no system was impacted".  ... 
doi:10.3390/network2010009 fatcat:5n7pioylqndnzk5zgmzfn6ysju
« Previous Showing results 1 — 15 out of 298 results