2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus) 2021
DOI: 10.1109/elconrus51938.2021.9396693
|View full text |Cite
|
Sign up to set email alerts
|

Phishing Attacks and Protection Against Them

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Social engineering is the main attack in the cryptocurrency community and has become increasingly common (Ivanov et al 2021;Weber et al 2020); it involves attackers using psychological tricks that enable them to gain access to the contents of users' wallets (Weber et al 2020). Cryptocurrency phishing is the most common technique used in social engineering techniques.…”
Section: Cryptocurrency Fraud and Phishingmentioning
confidence: 99%
“…Social engineering is the main attack in the cryptocurrency community and has become increasingly common (Ivanov et al 2021;Weber et al 2020); it involves attackers using psychological tricks that enable them to gain access to the contents of users' wallets (Weber et al 2020). Cryptocurrency phishing is the most common technique used in social engineering techniques.…”
Section: Cryptocurrency Fraud and Phishingmentioning
confidence: 99%
“…The most common PDF attack vectors are malicious links that can hide under regular-looking buttons inside the PDF file [72], [73]. The button could be a Fake CAPTCHA, coupon, file sharing download/request access button, static picture with a video play button, or any lure trick.…”
Section: Linksmentioning
confidence: 99%
“…Phishing is the sending of messages with the main objective to gather personal data of users [35,36]. It is a popular method for stealing credentials, committing fraud and distributing malware.…”
Section: Overview Ddos Phishing and Ransomwarementioning
confidence: 99%
“…It is a popular method for stealing credentials, committing fraud and distributing malware. Phishing is based on social engineering: by using methods of persuasion the attacker tries to circumvent a victim's critical thinking and let him perform the action which the phisher wants to accomplish, like giving credentials or installing malware [35]. There are 3 types of targets for phishing: general/indiscriminate, semi-targeted and spear phishing [37].…”
Section: Overview Ddos Phishing and Ransomwarementioning
confidence: 99%