Phishing and Spear Phishing: examples in Cyber Espionage and techniques to protect against them

Phishing attacks have become the most used technique in the online scams, initiating more than 91 how Phishing and Spear Phishing attacks are carried out by the phishers, through 5 steps which magnify the outcome, increasing the chance of success. The focus will be also given on four different layers of protection against these social engineering attacks, showing their strengths and weaknesses; the first and second layers consist of automated tools and decision-aid tools. the third one is users' knowledge and expertise to deal with potential threats. The last layer, defined as "external", will underline the importance of having a Multi-factor authentication, an effective way to provide an enhanced security, creating a further layer of protection against Phishing and Spear Phishing.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/15/2021

Cybersecurity Revisited: Honeytokens meet Google Authenticator

Although sufficient authentication mechanisms were enhanced by the use o...
research
09/12/2020

A Review on Cyber Crimes on the Internet of Things

Internet of Things (IoT) devices are rapidly becoming universal. The suc...
research
08/22/2021

Framework for Managing Cybercrime Risks in Nigerian Universities

Universities in developing countries, including those in Nigeria, experi...
research
01/12/2019

Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures

As Critical National Infrastructures are becoming more vulnerable to cyb...
research
09/24/2020

Lic-Sec: an enhanced AppArmor Docker security profile generator

Along with the rapid development of cloud computing technology, containe...
research
04/08/2023

KeyDetect –Detection of anomalies and user based on Keystroke Dynamics

Cyber attacks has always been of a great concern. Websites and services ...
research
01/03/2019

Towards Thwarting Social Engineering Attacks

Social engineering attacks represent an increasingly important attack ve...

Please sign up or login with your details

Forgot password? Click here to reset