[go: up one dir, main page]

Gashi, 2023 - Google Patents

Phishing: A viral cyber threat

Gashi, 2023

View PDF
Document ID
17514060039429192917
Author
Gashi G
Publication year

External Links

Snippet

The constant evolution of technology is beneficial for all of society in terms of healthcare, automation of tedious tasks, and raising mindfulness toward the global climate. Along with this constant evolution, cyber-crimes such as phishing evolves in parallel. To understand …
Continue reading at www.theseus.fi (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30522Query processing with adaptation to user needs

Similar Documents

Publication Publication Date Title
Alabdan Phishing attacks survey: Types, vectors, and technical approaches
Hijji et al. A multivocal literature review on growing social engineering based cyber-attacks/threats during the COVID-19 pandemic: challenges and prospective solutions
US12015639B2 (en) Systems and methods for polluting phishing campaign responses
EP3815330B1 (en) Enhanced techniques for generating and deploying dynamic false user accounts
Jahankhani et al. Cybercrime classification and characteristics
US9971891B2 (en) Methods, systems, and media for detecting covert malware
Pienta et al. A taxonomy of phishing: Attack types spanning economic, temporal, breadth, and target boundaries
Ahmed et al. PhishCatcher: client-side defense against web spoofing attacks using machine learning
Adu-Manu et al. Phishing attacks in social engineering: a review
Gururaj et al. Social Engineering in Cybersecurity: Threats and Defenses
Bundala Cybercrime: Psychological Tricks and Computer Securities Challenges
Frumento et al. The role of Social Engineering in evolution of attacks
Hegt Analysis of current and future phishing attacks on internet banking services
Gashi Phishing: A viral cyber threat
Shaw Why phishing works and the detection needed to prevent it
Bharath et al. Introduction to Social Engineering: The Human Element of Hacking
ThreatLab Zscaler threatlabz 2023 phishing report
Wang Mitigating phishing threats
Farrell Phishing in the financial sector
Kanwar et al. Foundations of Phishing Defense: Comprehensive Strategies for Digital Asset Protection
McAnulty Phishing Attacks: A Plan to Educate Employees and Mitigate Risks
Fayyad-Kazan et al. A Pilot Study to Assess the Success Rate of Email Scams by Phishing: Case in Lebanon
Mercuri Enhancing Cybersecurity Awareness: mitigating phishing risks for employees in a small company
Baral Building Confidence not to be Phished: Conceptualising User’s Self-Efficacy In Phishing Threat Avoidance Behaviour
Chaudhari et al. Detection of SMS Fraudulent using ANN Algorithm