Ayumu et al., 2024 - Google Patents
Threat of Technical Support Scams in JapanAyumu et al., 2024
- Document ID
- 12433528158142527429
- Author
- Ayumu Y
- Hiroyuki I
- Kosuke K
- Tetsuya K
- Taichi A
- Takahiro K
- Publication year
- Publication venue
- 2024 IEEE Conference on Dependable and Secure Computing (DSC)
External Links
Snippet
Technical support scam is a criminal act of defrauding people of money by posing as technical support. Technical support scams are mainly perpetrated by through online advertisements and pop-ups that display fake virus infection warnings on victims' PCs. The …
- 238000000034 method 0 abstract description 42
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11818164B2 (en) | System and method for omnichannel social engineering attack avoidance | |
| Miramirkhani et al. | Dial one for scam: A large-scale analysis of technical support scams | |
| Tu et al. | Users really do answer telephone scams | |
| Kim et al. | HearMeOut: detecting voice phishing activities in Android | |
| Chaganti et al. | Recent trends in social engineering scams and case study of gift card scam | |
| Grimes | Fighting Phishing: everything you can do to fight social engineering and phishing | |
| Rauti et al. | “you have a potential hacker’s infection”: A study on technical support scams | |
| Hinson | Social engineering techniques, risks, and controls | |
| Bundala | Cybercrime: Psychological Tricks and Computer Securities Challenges | |
| Ayumu et al. | Threat of Technical Support Scams in Japan | |
| Bordjiba et al. | Data-driven approach for automatic telephony threat analysis and campaign detection | |
| Musa et al. | Emerging Trends in Phishing: A Look at Smishing, Vishing, Quishing | |
| Steinmetz et al. | Social engineering | |
| Harley et al. | My pc has 32,539 errors: how telephone support scams really work | |
| Ang | Mitigating challenges in an evolving cyber threat landscape | |
| Andaluri et al. | A Critical Study of Social Engineering vis-a-vis Phishing Attacks | |
| Síochána | Cyber Crime | |
| Esmat et al. | The Impact of Phishing on the Business Sector in KSA: Analytical Study | |
| Zimba et al. | On emergent mobile phone-based social engineering cyberattacks in developing countries: The case of the Zambian ICT sector | |
| Liu | Understanding and Defending Against Telephone Scams with Large-Scale Data Analytics and Machine Learning Systems | |
| Tabron | Creating urgency in tech support scam telephone conversations | |
| Rabbani | An Investigation of People’s Perception of Digital Threats | |
| Veitaitė | CHALLENGES OF CYBER SECURITY IN MODERN SOCIETY: THE IMPACT OF SOCIAL ENGINEERING | |
| Graydon | Phishing and Pharming: The New Evolution of Identity Theft | |
| Sravanthi | Understanding Vishing: The Tactics Behind Voice Phishing Scams |