An investigation of phishing awareness and education over time: When and how to best remind users
Security awareness and education programmes are rolled out in more and more
organisations. However, their effectiveness over time and, correspondingly, appropriate …
organisations. However, their effectiveness over time and, correspondingly, appropriate …
Put your warning where your link is: Improving and evaluating email phishing warnings
Phishing emails often disguise a link's actual URL. Thus, common anti-phishing advice is to
check a link's URL before clicking, but email clients do not support this well. Automated …
check a link's URL before clicking, but email clients do not support this well. Automated …
Measuring identity confusion with uniform resource locators
Uniform Resource Locators (URLs) unambiguously specify host identity on the web. URLs
are syntactically complex, and although software can accurately parse identity from URLs …
are syntactically complex, and although software can accurately parse identity from URLs …
[PDF][PDF] Phishing awareness and education–When to best remind
The use of security awareness and education pro-grammes is very common in
organisations. But how effective are they over time? Some initial research on this question …
organisations. But how effective are they over time? Some initial research on this question …
Developing and evaluating a five minute phishing awareness video
Confidence tricksters have always defrauded the unwary. The computer era has merely
extended their range and made it possible for them to target anyone in the world who has an …
extended their range and made it possible for them to target anyone in the world who has an …
Influence of URL Formatting on Users' Phishing URL Detection
Despite technical advances in anti-phishing protection, in many cases the detection of
phishing URLs largely depends on users manually inspecting the links found in suspicious …
phishing URLs largely depends on users manually inspecting the links found in suspicious …
Understanding the viability of gmail's origin indicator for identifying the sender
The current design of email authentication mechanisms has made it challenging for email
providers to establish the authenticity of email messages with complicated provenance, such …
providers to establish the authenticity of email messages with complicated provenance, such …
[PDF][PDF] Phishing Attacks in Social Engineering: A Review.
Organisations closed their offices and began working from home online to prevent the
spread of the COVID-19 virus. This shift in work culture coincided with increased online use …
spread of the COVID-19 virus. This shift in work culture coincided with increased online use …
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector
Phishing is currently one of the biggest threats in cybersecurity for both the business and the
private contexts. A large percentage of phishing attacks are blocked by automated technical …
private contexts. A large percentage of phishing attacks are blocked by automated technical …
Better Together: The Interplay Between a Phishing Awareness Video and a Link-centric Phishing Support Tool
Two popular approaches for helping consumers avoid phishing threats are phishing
awareness videos and tools supporting users in identifying phishing emails. Awareness …
awareness videos and tools supporting users in identifying phishing emails. Awareness …