Attackers are becoming more skilled in recent years, using sophisticated technology to produce look-alike emails that make it difficult to distinguish between real and fake ones …
Active DNS measurement is fundamental to understanding and improving the DNS ecosystem. However, the absence of an extensible, high-performance, and easy-to-use …
Since ZMap's debut in 2013, networking and security researchers have used the open- source scanner to write hundreds of research papers that study Internet behavior. In …
A Prasad, S Chandra - Computers & Security, 2024 - Elsevier
With the proliferation of the World Wide Web and the increasing sophistication of cyber threats, phishing attacks have emerged as a significant concern for individuals and …
The critical role played by email has led to a range of extension protocols (eg, SPF, DKIM, DMARC) designed to protect against the spoofing of email sender domains. These protocols …
K Schiller, F Adamsky, Z Benenson - Extended Abstracts of the 2023 CHI …, 2023 - dl.acm.org
E-mail phishing attacks are still the number one gateway for attackers. Even when the patch level of a network is up to date, if one employee clicks on a link in a phishing e-mail and …
A safe and secure Domain Name System (DNS) is of paramount importance for the digital economy and society. Malicious activities on the DNS, generally referred to as" DNS abuse" …
User deception in emails is still one of the biggest security risks companies and end-users face alike. Attackers try to mislead their victims when assessing whether emails are …
S Fernandez, M Korczyński, A Duda - International Conference on Passive …, 2022 - Springer
Spam domains are sources of unsolicited mails and one of the primary vehicles for fraud and malicious activities such as phishing campaigns or malware distribution. Spam domain …