|
|
|
Brent Pethers and Abubakar Bello
Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigat...
ver más
|
|
|
|
|
|
|
Ahlam Fakieh and Aymen Akremi
Social engineering (SE) attacks (also called social hacking) refer to various methods used by cybercriminals to exploit the weak nature of human beings rather than the logical and physical security measures used by organizations. This research paper stud...
ver más
|
|
|
|
|
|
|
Emtethal K. Alamri, Abdullah M. Alnajim and Suliman A. Alsuhibany
Phishing is a cybercrime that is increasing exponentially day by day. In phishing, a phisher employs social engineering and technology to misdirect victims towards revealing their personal information, which can then be exploited. Despite ongoing researc...
ver más
|
|
|
|
|
|
|
Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang and Peter Nimbe
A phishing attack is one of the less complicated ways to circumvent sophisticated technical security measures. It is often used to exploit psychological (as as well as other) factors of human users to succeed in social engineering attacks including ranso...
ver más
|
|
|
|
|
|
|
Majid H. Alsulami, Fawaz D. Alharbi, Hamdan M. Almutairi, Bandar S. Almutairi, Mohammed M. Alotaibi, Majdi E. Alanzi, Khaled G. Alotaibi and Sultan S. Alharthi
Social engineering is one of the most inventive methods of gaining unauthorized access to information systems and obtaining sensitive information. This type of cybersecurity threat requires minimal technical knowledge because it relies on the organizatio...
ver más
|
|
|
|
|
|
|
Fatima Salahdine and Naima Kaabouch
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the securit...
ver más
|
|
|
|
|
|
|
Hussain Aldawood and Geoffrey Skinner
The idea and perception of good cyber security protection remains at the forefront of many organizations? information and communication technology strategy and investment. However, delving deeper into the details of its implementation reveals that organi...
ver más
|
|
|
|
|
|
|
David Airehrour, Nisha Vasudevan Nair and Samaneh Madanian
Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in sight. This research study assesse...
ver más
|
|
|
|
|
|
|
Gaute Wangen
The recent emergence of the targeted use of malware in cyber espionage versus industry requires a systematic review for better understanding of its impact and mechanism. This paper proposes a basic taxonomy to document major cyber espionage incidents, de...
ver más
|
|
|
|