Phishing attacks survey: Types, vectors, and technical approaches
R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
Human factors in phishing attacks: a systematic literature review
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …
trustworthy entity in digital communication. It is a type of cyber attack often successful …
Don't click: towards an effective anti-phishing training. A comparative literature review
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
Phishing in organizations: Findings from a large-scale and long-term study
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …
we conducted in collaboration with a partner company. Our experiment ran for 15 months …
Human cognition through the lens of social engineering cyberattacks
R Montañez, E Golob, S Xu - Frontiers in psychology, 2020 - frontiersin.org
Social engineering cyberattacks are a major threat because they often prelude sophisticated
and devastating cyberattacks. Social engineering cyberattacks are a kind of psychological …
and devastating cyberattacks. Social engineering cyberattacks are a kind of psychological …
How experts detect phishing scam emails
R Wash - Proceedings of the ACM on Human-Computer …, 2020 - dl.acm.org
Phishing scam emails are emails that pretend to be something they are not in order to get
the recipient of the email to undertake some action they normally would not. While technical …
the recipient of the email to undertake some action they normally would not. While technical …
Experimental investigation of technical and human factors related to phishing susceptibility
This article reports on a simulated phishing experiment targeting 6,938 faculty and staff at
George Mason University. The three-week phishing campaign employed three types of …
George Mason University. The three-week phishing campaign employed three types of …
How do Older Adults feel about engaging with Cyber‐Security?
Older adults are increasingly a target for cyber‐attacks; however, very little research has
investigated how they feel about engaging in protective cyber‐security behaviors. We …
investigated how they feel about engaging in protective cyber‐security behaviors. We …
Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks
Many cyberattacks begin with a malicious email message, known as spear phishing,
targeted at unsuspecting victims. Although security technologies have improved significantly …
targeted at unsuspecting victims. Although security technologies have improved significantly …
The influence of context on response to spear-phishing attacks: An in-situ deception study
V Distler - Proceedings of the 2023 CHI Conference on Human …, 2023 - dl.acm.org
In today's digitized societies, phishing attacks are a security threat with damaging
consequences. Organizations remain vulnerable to phishing attacks, and it is not clear how …
consequences. Organizations remain vulnerable to phishing attacks, and it is not clear how …