Understanding Social Engineering Based Scams 2016
DOI: 10.1007/978-1-4939-6457-4_5
|View full text |Cite
|
Sign up to set email alerts
|

Traditional Countermeasures to Unwanted Email

Abstract: The Software Supply Chain (SSC) has captured considerable attention from attackers seeking to infiltrate systems and undermine organizations. There is evidence indicating that adversaries utilize Social Engineering (SocE) techniques specifically aimed at software developers. That is, they interact with developers at critical steps in the Software Development Life Cycle (SDLC), such as accessing Github repositories, incorporating code dependencies, and obtaining approval for Pull Requests (PR) to introduce mali… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Software, such as blacklists and whitelists, may also protect businesses from BEC fraud. A blacklist enables an email account holder to restrict communication from undesirable sources (Siadati et al , 2016). More specifically, “[…] if the sender’s IP address, email address or other attribute are on the blacklist, the connection will be terminated before the email is received” (Kruck and Kruck, 2006, p. 98).…”
Section: Technical Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Software, such as blacklists and whitelists, may also protect businesses from BEC fraud. A blacklist enables an email account holder to restrict communication from undesirable sources (Siadati et al , 2016). More specifically, “[…] if the sender’s IP address, email address or other attribute are on the blacklist, the connection will be terminated before the email is received” (Kruck and Kruck, 2006, p. 98).…”
Section: Technical Solutionsmentioning
confidence: 99%
“…For example, the use of filtering emails, to remove suspicious emails from one’s inbox is a popular measure used across both individual and organisational email systems. Filtering relies on the combination of words in emails to differentiate between legitimate communications and phishing attacks (Siadati et al , 2016). Although this may be useful to prevent conventional phishing attacks, which typically involve offenders sending identical emails en masse , highly customised BEC fraud emails that target specific businesses are unlikely to be detected by spam and phishing filters.…”
Section: Challenges To Both Technical and Non-technical Prevention Measuresmentioning
confidence: 99%
“…Adopting single sign-on (SSO) or better Multi-Factor Authentication (MFA) [55] to guarantee that only authorized users have access to ChatGPT is a good enterprise security practice. Besides, to protect against the emerging dangerous class of AI-enabled attacks such as WormGPT or FraudGPT, it is essential to utilize robust email authentication such as DMARC [56] to avoid spoofing [57]. Additionally, keeping ChatGPT and all other software up to date with the newest security patches and upgrades is essential.…”
Section: ) Implementing Authentication Measures and Managing Software...mentioning
confidence: 99%