2016
DOI: 10.14257/ijsia.2016.10.1.23
|View full text |Cite
|
Sign up to set email alerts
|

Phishing Attacks and Defenses

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 77 publications
(50 citation statements)
references
References 20 publications
0
46
1
Order By: Relevance
“…In recent years, researchers and organisations have categorised phishing attacks in similar or sometimes in different ways. Some examples of the mentioned categorisations of phishing tactics are "Deceptive Phishing" [57], "Malware-based Phishing" [11,[57][58][59], "Key-loggers" and "Screen-loggers" , "Website Forgery" [58], "Social Engineering" [11], "Mimicry" [11], "Email Spoofing" [11], "URL Hiding" [11], "Invisible Content" [11], "Image Content" [11].…”
Section: Phishing Attacksmentioning
confidence: 99%
“…In recent years, researchers and organisations have categorised phishing attacks in similar or sometimes in different ways. Some examples of the mentioned categorisations of phishing tactics are "Deceptive Phishing" [57], "Malware-based Phishing" [11,[57][58][59], "Key-loggers" and "Screen-loggers" , "Website Forgery" [58], "Social Engineering" [11], "Mimicry" [11], "Email Spoofing" [11], "URL Hiding" [11], "Invisible Content" [11], "Image Content" [11].…”
Section: Phishing Attacksmentioning
confidence: 99%
“…Different researchers have been proposed several techniques for solving the phishing problem. Junaid et al (2016) explained that phishing can be reduced through a combination of user and corporate safeguards and serverside measures. User education remains the strongest and at the same time, the weakest link to phishing countermeasures.…”
Section: Phishing: An Overviewmentioning
confidence: 99%
“…In other situations, they may pose as outsiders, such as IT consultants, maintenance supporters, and native employees, etc. [59], [60]. In case of smartphones, social engineers usually take advantage from malicious advertising (Adware or "Malvertising").…”
Section: B Attacks or Threatsmentioning
confidence: 99%
“…For example, a phishing app demonstrates a fake mobile banking login screen to steal the user"s account information (e.g. username and password) [47], [60]. Mostly, it applied to hijack confidential information in the cover of fake mobile banking apps which have become a recurring threat according to several incidents reported.…”
Section: B Attacks or Threatsmentioning
confidence: 99%