Inicio  /  Future Internet  /  Vol: 12 Par: 10 (2020)  /  Artículo
ARTÍCULO
TITULO

Phishing Attacks Survey: Types, Vectors, and Technical Approaches

Rana Alabdan    

Resumen

Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which are growing rapidly. Therefore, there is a need to conduct a comprehensive review of past and current phishing approaches. In this paper, a review of the approaches used during phishing attacks is presented. This paper comprises a literature review, followed by a comprehensive examination of the characteristics of the existing classic, modern, and cutting-edge phishing attack techniques. The aims of this paper are to build awareness of phishing techniques, educate individuals about these attacks, and encourage the use of phishing prevention techniques, in addition to encouraging discourse among the professional community about this topic.

 Artículos similares

       
 
Andrei Butnaru, Alexios Mylonas and Nikolaos Pitropakis    
Nowadays, the majority of everyday computing devices, irrespective of their size and operating system, allow access to information and online services through web browsers. However, the pervasiveness of web browsing in our daily life does not come withou... ver más
Revista: Future Internet

 
Fatima Salahdine and Naima Kaabouch    
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the securit... ver más
Revista: Future Internet

 
Shayan Taheri, Milad Salem and Jiann-Shiun Yuan    
The advancements in the Internet has enabled connecting more devices into this technology every day. The emergence of the Internet of Things has aggregated this growth. Lack of security in an IoT world makes these devices hot targets for cyber criminals ... ver más