Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape
A Papathanasiou, G Liontos, V Liagkou… - Journal of Cybersecurity …, 2023 - mdpi.com
Business Email Compromise (BEC) attacks have emerged as serious threats to
organizations in recent years, exploiting social engineering and malware to dupe victims …
organizations in recent years, exploiting social engineering and malware to dupe victims …
Towards a cybercontextual transmission model for online scamming
AC Tambe Ebot, M Siponen… - European Journal of …, 2024 - Taylor & Francis
This study focuses on advance fee fraud (AFF) scamming, a specific form of online
deception in which scammers rely on social engineering techniques to deceive individuals …
deception in which scammers rely on social engineering techniques to deceive individuals …
Utilizing convolutional neural networks and word embeddings for early-stage recognition of persuasion in chat-based social engineering attacks
Social engineering is widely recognized as the key to successful cyber-attacks. Chat-based
social engineering (CSE) attacks are attracting increasing attention because of recent …
social engineering (CSE) attacks are attracting increasing attention because of recent …
Building and evaluating an annotated corpus for automated recognition of chat-based social engineering attacks
N Tsinganos, I Mavridis - Applied Sciences, 2021 - mdpi.com
Featured Application Methods and techniques demonstrated in this work can be used to
increase chat-based social engineering attack detection algorithms. Abstract Chat-based …
increase chat-based social engineering attack detection algorithms. Abstract Chat-based …
The impact of surface features on choice of (in) secure answers by Stackoverflow readers
D Van Der Linden, E Williams, J Hallett… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Existing research has shown that developers will use StackOverflow to answer programming
questions: but what draws them to one particular answer over any other? The choice of …
questions: but what draws them to one particular answer over any other? The choice of …
Active countermeasures for email fraud
As a major component of online crime, email-based fraud is a threat that causes substantial
economic losses every year. To counteract these scammers, volunteers called scam-baiters …
economic losses every year. To counteract these scammers, volunteers called scam-baiters …
Refining the pointer “human firewall” pentesting framework
JM Archibald, K Renaud - Information & Computer Security, 2019 - emerald.com
Purpose Penetration tests have become a valuable tool in the cyber security defence
strategy in terms of detecting vulnerabilities. Although penetration testing has traditionally …
strategy in terms of detecting vulnerabilities. Although penetration testing has traditionally …
Internet fraud: the case of account takeover in online marketplace
R Kawase, F Diana, M Czeladka, M Schüler… - Proceedings of the 30th …, 2019 - dl.acm.org
Account takeover is a form of online identity theft where a fraudster gains unauthorized
access to an individual's account in a given system. Depending on the system, this …
access to an individual's account in a given system. Depending on the system, this …
[HTML][HTML] Preventing fraud victimisation against older adults: Towards a holistic model for protection
M Button, V Karagiannopoulos, J Lee, JB Suh… - International Journal of …, 2024 - Elsevier
The prevention of fraud against older adults and other age groups, has been the subject of
limited research with very few systematic attempts to map different tools and strategies that …
limited research with very few systematic attempts to map different tools and strategies that …
A villain's guide to social media and web science
M Bernstein, C Hooper - Proceedings of the 29th on Hypertext and …, 2018 - dl.acm.org
If we have not yet achieved planetary super-villainy on the desktop, it may be feasible to fit it
into a suburban office suite. Social media and Web science permit the modern villain to …
into a suburban office suite. Social media and Web science permit the modern villain to …