Fifteen years of phishing: can technology save us?

@article{Furnell2019FifteenYO,
  title={Fifteen years of phishing: can technology save us?},
  author={Steven Furnell and Kieran Millet and Maria Papadaki},
  journal={Computer Fraud \& Security},
  year={2019}
}

Assessment of End-User Susceptibility to Cybersecurity Threats in Saudi Arabia by Simulating Phishing Attacks

This study focuses on evaluating the level of cybersecurity knowledge and cyber awareness in Saudi Arabia by assessing end-user susceptibility through three phishing attack simulations and discusses the tools and techniques associated with each attack simulation.

An Overview of Phishing Victimization: Human Factors, Training and the Role of Emotions

  • Mousa Jari
  • Computer Science, Psychology
    Computer Science and Information Technology
  • 2022
Comparing what security organizations and researchers have highlighted in terms of phishing types and categories as well as training in tackling the problem is compared in a literature review which takes into account all major credible and published sources.

Evaluation of Montenegrin Seafarer's Awareness of Cyber Security

This research paper examines Montenegrin seafarers’ level of familiarisation with current cybersecurity risks by conducting a structured survey questionnaire and proposes the best practices for maritime cyber security in the form of implementation of mandatory training course.

The human factor: assessing individuals' perceptions related to cybersecurity

Four unique viewpoints emerged such that one represents cybersecurity best practices and the remaining three viewpoints represent poor cybersecurity behaviors that indicate a need for educational interventions within both the public and private sectors.

Introducing the concept of cybersecurity footprint

The authors envision it as another perspective of assessing cyber risk and further help mitigate future cyber incidents and present organizations with ways to lower cybersecurity footprint along with recommendations for future research.

An Examination of User Detection of Business Email Compromise Amongst Corporate Professionals

iv Acknowledgements vi List of Tables ix List of Figures x

A C OMPREHENSIVE S URVEY OF P HISHING A TTACKS AND D EFENCES : H UMAN F ACTORS , T RAINING AND THE R OLE OF E MOTIONS

What security organizations and researchers have highlighted and emphasised in terms of phishing types and categories as well as training in tackling the problem are compared in a literature review which takes into account all major credible and published sources.

ROLE OF EMOTIONS

  • 2022

References

SHOWING 1-3 OF 3 REFERENCES

A Survey of Phishing Email Filtering Techniques

This is the first comprehensive survey to discuss methods of protection against phishing email attacks in detail, and presents an overview of the various techniques presently used to detect phishing emails, at the different stages of attack, mostly focusing on machine-learning techniques.

Examining the effectiveness of phishing filters against DNS based phishing attacks

This work proposes the inclusion of domain name system server authentication and verification of name servers for a visiting website for all future anti-phishing toolbars and proposes that a Web browser should maintain a white list of websites that engage in online monetary transactions so that when a user requires to access any of these, the default protocol should always be HTTPS.

Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild

This paper focuses on manual account hijacking---account hijacking performed manually by humans instead of botnets, and describes the details of the hijacking workflow: the attack vectors, the exploitation phase, and post-hijacking remediation.