P Schaab, K Beckers, S Pape - Information & Computer Security, 2017 - emerald.com
Purpose This paper aims to outline strategies for defence against social engineering that are missing in the current best practices of information technology (IT) security. Reason for the …
Purpose Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses risks to businesses, government agencies and all users due to sensitive data …
Most modern malware download attacks occur via the browser, typically due to social engineering and driveby downloads. In this paper, we study the “origin” of malware …
T Sommestad, H Karlzén - 2019 APWG symposium on …, 2019 - ieeexplore.ieee.org
Phishing is a serious threat to any organization allowing their employees to use messaging systems and computers connected to the internet. Consequently, researchers have …
R Bhakta, IG Harris - Proceedings of the 2015 IEEE 9th …, 2015 - ieeexplore.ieee.org
Cyberattackers often attack the weakest point of system, which is increasingly the people who use and interact with a computer-based system. A great deal of research has been …
A Smith, M Papadaki, SM Furnell - … Education and Training: 8th IFIP WG …, 2013 - Springer
Social engineering is a method of attack involving the exploitation of human weakness, gullibility and ignorance. Although related techniques have existed for some time, current …
Social engineering denotes, within the realm of security, a type of attack against the human element during which the assailant induces the victim to release information or perform …
L Goeke, A Quintanar, K Beckers, S Pape - International Workshop on …, 2019 - Springer
Social engineering is the clever manipulation of human trust. While most security protection focuses on technical aspects, organisations remain vulnerable to social engineers …
Humans have become the weakest point in the information security chain, and social engineers take advantage of that fact. Social engineers manipulate people psychologically …