Science topic

Phishing - Science topic

Explore the latest publications in Phishing, and find Phishing experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Phishing (10,000)
Sorted by most recent
Research
Full-text available
The rapid adoption of blockchain technology across industries has revolutionized the way transactions are conducted, offering transparency, decentralization, and immutability. However, the increasing reliance on blockchain systems has also made them a prime target for cyberattacks, ranging from smart contract vulnerabilities to sophisticated fraud...
Conference Paper
Full-text available
As the cybersecurity threat landscape continues to evolve, there is a growing awareness within the industry that protection against threats depends on more than complex technology infrastructure and tools. Human error is still considered to be the cause of most cybersecurity breaches, but humans may also be the key to building a successful cybersec...
Article
Full-text available
This article provides a comprehensive exploration of passwordless authentication, a rapidly evolving approach to digital security that eliminates the need for traditional Venkata Krishna Ramesh Kumar Koppireddy https://iaeme.com/Home/journal/IJITMIS 83 editor@iaeme.com passwords. It examines various types of passwordless methods, including biometri...
Preprint
Full-text available
As artificial intelligence surpasses human intelligence in all domains, the nature of deception, fraud, and manipulation will evolve beyond anything previously imaginable. Traditional scams—based on financial theft, identity fraud, and misinformation—will be replaced by hyperintelligent deception mechanisms that target perception, reality, and even...
Article
Full-text available
The increasing adoption of cloud-based Electronic Health Records (EHRs) has transformed healthcare by enhancing data accessibility, interoperability, and patient care efficiency. However, this transition has also introduced new cybersecurity vulnerabilities, with ransomware emerging as a critical threat to healthcare systems. Ransomware attacks dis...
Article
Full-text available
Cybercrime is a specialised field that use internet communication networks to enhance the identification of cyber offenders via cyber laws. Extensive study is being undertaken to provide appropriate legal methodologies for preventing and regulating cybercriminal activity. Malware and phishing detection have become as prominent subjects in the last...
Conference Paper
Full-text available
Phishing is a cyber attack in which malicious actors attempt to deceive users into providing sensitive information, such as login credentials, financial details, or personal identification. These attacks are primarily carried out through fraudulent URLs that direct unsuspecting victims to websites designed to look like trusted platforms. In this re...
Article
Full-text available
In cybersecurity, we often focus on the threats we can see, but what about the unseen risks that could cause catastrophic failures? In this article, Juan Pablo Castro applies Abraham Wald’s WWII survivorship bias lesson to cyber risk management, highlighting how organizations tend to reinforce security based on visible vulnerabilities while ignorin...
Article
Full-text available
Hackers focus on attacking small enterprises and medical institutions because their security protocols remain inadequate. The research evaluates both small business and healthcare organization security threats through a strategic approach that functions as a vital measure to counteract possible dangers. According to the research both phishing event...
Article
Full-text available
Small to medium-sized enterprises (SMEs) along with healthcare providers find themselves in a difficult position because they need to protect themselves from cyber threats despite having limited funding options. Because of increasing cyber threats that include phishing and ransomware and insider attacks these organizations need flexible budget-frie...
Chapter
Full-text available
Background: Many security interventions to support users in detecting phishing emails exist including providing the URL in a tooltip or the statusbar. Aim: Designing and evaluating an anti-phishing artifact based on the Useful Transparency theory. Method: We used the design science research approach for the entire process. As evaluation we ran a be...
Article
Full-text available
Phishing and ransomware attacks are significant cyber threats that target financial institutions, aiming to deceive users and exploit vulnerabilities for malicious gains. Phishing attacks often involve fraudulent emails or websites that trick users into revealing sensitive information, while ransomware encrypts a victim's data and demands payment f...
Article
Full-text available
Our methodology utilizes a supervised learning approach, employing Random Forest and Gradient Boosting Machines (GBM) trained on a comprehensive dataset that includes email headers, content, and sender behavior. This approach allows our models to discern complex patterns associated with phishing attempts, achieving a 92% detection rate, a substanti...
Article
Full-text available
Digital technologies have transformed modern society, enhancing convenience and economic opportunities. However, they have also introduced new vulnerabilities, particularly in the form of fake advertisements, online shopping fraud, public Wi-Fi security risks, and mobile internet fraud. This study assesses the economic implications of these digital...
Article
Full-text available
Telemedicine's rapid expansion has improved healthcare accessibility but has also increased cybersecurity risks, particularly AI-powered phishing attacks that exploit authentication vulnerabilities. Patient data breaches are rising due to sophisticated phishing schemes targeting healthcare providers and patients. This study analyzes the impact of A...
Article
Full-text available
As small and medium-sized enterprises (SMEs) embrace digital transformation, they face an increasing number of cybersecurity threats, including ransomware, phishing attacks, and data breaches. Unlike large corporations, SMEs often lack the financial and technical resources needed to implement robust cybersecurity defenses. Cybersecurity resilience-...
Article
Full-text available
Cybersecurity is increasingly recognized as a critical driver of operational efficiency for small and medium-sized enterprises (SMEs). As digital transformation accelerates, SMEs face escalating cyber threats, including phishing, ransomware, and data breaches, which can disrupt business operations and result in financial and reputational damage. Wh...
Article
Full-text available
The rapid adoption of cloud computing has transformed small and medium-sized enterprises (SMEs), offering cost-effective, scalable, and flexible solutions to enhance business efficiency. However, this transition also exposes SMEs to an increasingly complex and evolving cyber threat landscape. Limited financial and technical resources make SMEs part...
Article
Full-text available
Short Message Service (SMS) spam poses significant risks, including financial scams and phishing attempts. Although numerous datasets from online repositories have been utilized to address this issue, little attention has been given to evaluating their effectiveness and impact on SMS spam detection models. This study fills this gap by assessing the...
Research
Full-text available
Cyberattacks' growing complexity needs advanced, AI-driven threat detection and mitigation strategies. The performance of machine learning models such as Random Forests, Support Vector Machines, Deep Learning, and Reinforcement Learning is evaluated using the CIC TruthSeeker2023 dataset. The ensemble technique integrating Random Forests and Convolu...
Article
Full-text available
Phishing webpage detection is critical in combating cyber threats, yet distinguishing between benign and phishing webpages remains challenging due to significant feature overlap in the representation space. This study introduces a reinforced Triplet Network to optimize disentangled representation learning tailored for phishing detection. By employi...
Article
Full-text available
In today's digital economy, small and medium enterprises (SMEs) rely on technology to drive efficiency, innovation, and market competitiveness. Cloud computing, automation, artificial intelligence (AI), and data analytics have revolutionized business operations, enabling SMEs to optimize workflows, reduce costs, and improve customer experiences. Ho...
Article
Full-text available
The speedy development of technology and the well-known use of mobile phones have introduced various risks, such as spam and phishing attacks. Machine learning is one of the top extensively used and renowned technologies for detecting spam in communications. This work integration machine learning techniques like logistic regression and other classi...
Article
Full-text available
Small and medium enterprises (SMEs) are the backbone of global economies, accounting for a significant share of employment, innovation, and economic development. As the digital landscape evolves, SMEs increasingly rely on technology to optimize business operations, improve customer interactions, and enhance market competitiveness. However, this dig...
Article
Full-text available
In an era where cyber threats are becoming increasingly sophisticated and pervasive, small and medium-sized enterprises (SMEs) and healthcare providers face heightened cybersecurity risks. Unlike large corporations with substantial security budgets, these organizations often operate with limited financial resources, minimal IT staff, and inadequate...
Article
Full-text available
Malicious domains are part of the landscape of the internet but are becoming more prevalent and more dangerous both to companies and to individuals. They can be hosted on various technologies and serve an array of content, including malware, command and control and complex phishing sites that are designed to deceive and expose. Tracking, blocking a...
Article
Full-text available
Abstrak Era digital telah membawa perubahan yang signifikan dalam berbagai aspek kehidupan manusia. Teknologi digital telah mengubah cara individu berinteraksi satu sama lain dengan canggih, fleksibel dan bekerja dari mana pun. Kesadaran digital menjadi kunci utama dalam menghadapi tantangan masa depan yang semakin terdigitalisasi. Artikel ini memb...
Article
Full-text available
The rapid advancement of artificial intelligence (AI) has empowered cybercriminals to launch sophisticated attacks that bypass traditional defenses. These AI-powered cyberattacks-ranging from automated phishing and adversarial AI evasion to deepfake fraud-pose unprecedented threats to global cybersecurity. This review examines the evolution and mul...
Article
Full-text available
In today's fast-paced digital economy, small and medium-sized enterprises (SMEs) are increasingly reliant on technology to drive business growth, enhance productivity, and streamline operations. From cloud computing and e-commerce platforms to digital payment systems and remote work solutions, SMEs leverage digital tools to remain competitive. Howe...
Article
Full-text available
In the modern digital landscape, small and medium-sized enterprises (SMEs) play a crucial role in driving economic growth, fostering innovation, and providing employment opportunities. However, their increasing reliance on technology for day-today operations has made them prime targets for cyber threats, including ransomware attacks, phishing schem...
Article
Full-text available
The growing count of digital connections calls for robust IAM solutions. Common with password-based access control-which has been used for decades-are phishing, credential stuffing, and brute-force assaults. This increasing vulnerability calls for additional safe methods of authentication. Far safer than passwords is biometric authentication, which...
Conference Paper
Full-text available
This paper analyzes the prevalence, types, and root causes of social engineering attacks in Pakistan, emphasizing their implications. Researcher also proposed some possible solutions. In the era of rapid technological advancement, social engineering attacks have emerged as a significant cyber security challenge, particularly in countries like Pakis...
Article
Full-text available
This paper analyzes the prevalence, types, and root causes of social engineering attacks in Pakistan, emphasizing their implications. Researcher also proposed some possible solutions. In the era of rapid technological advancement, social engineering attacks have emerged as a significant cyber security challenge, particularly in countries like Pakis...
Preprint
Full-text available
With the growing complexity of cyber threats, deep learning has become a vital tool in cybersecurity. This paper examines how neural networks, anomaly detection models, and adversarial learning techniques are improving threat detection and cyber defense. Case studies on malware detection, intrusion prevention, and phishing attack mit-igation are an...
Article
Full-text available
Over the years, the rapid expansion of the internet and the widespread use of various applications have brought about increasingly concerning security threats. Cybercrimes, which include spamming, identity theft, pornography, hacking, fraudulent emails, piracy, and phishing, occur daily and pose a significant global issue, particularly in Africa, w...
Article
Full-text available
This study examines financial risk management in digital-only banking by analyzing fraud and cybersecurity threats using quantitative methodologies. Leveraging Verizon's Data Breach Investigations Report (2024), the European Central Bank Cyber Resilience Oversight Report (2023), and the Financial Action Task Force Money Laundering & Fraud Preventio...
Presentation
Full-text available
This technical report presents a multi-layered defense strategy to address cybersecurity threats, focusing on technical, human-centered, and organizational solutions. It analyzes the rising threat of cyberattacks and proposes a comprehensive approach to combat them. The report also discusses the devastating impact of ransomware on organizations and...
Article
Full-text available
Email phishing simulation involves the creation and execution of controlled scenarios to mimic real-world phishing attacks, with the goal of assessing an organization's susceptibility to such cyber threats. This process typically entails the creation of realistic-looking phishing emails, which may contain malicious links or deceptive content, and...
Preprint
Full-text available
The persistent rise of cyber threats, particularly phishing and malware attacks, has created an urgent need for innovative and robust defense mechanisms. Traditional rule-based security systems frequently struggle to adapt to rapidly changing attack vectors, creating significant vulnerabilities across organizational infrastructures. To address thes...
Article
Full-text available
While attempts by malicious actors to compromise computer systems continue to increase, there have been limited success in educating corporate learners. Most corporations must rely upon firewalls, email filtering, and other tools to prevent compromises since their employees vary in prevention reliability. Recent studies have shown limited success o...
Article
Full-text available
Over time, “Artificial Intelligence (AI)” has become an increasingly important component in the field of Cybersecurity. The ability of artificial intelligence to detect, prevents, and manages cyber hazards have the potential to bring about a profound transformation in the way that businesses operate. “Machine Learning (ML) models” and other AI-driv...
Article
Full-text available
Phishing is a fraudulent activity wherein an attacker impersonates a trusted individual or organization to acquire sensitive information from an online user. Phishing websites have become a major cybersecurity issue in the contemporary digital landscape. As online activities expand in e-commerce , banking, and social media, the hazards presented by...
Article
Full-text available
This study explores the rise of Ransomware-as-a-Service (RaaS) in Indonesia’s cybercrime ecosystem, highlighting its role as a significant digital security threat. RaaS lowers the technical barriers to executing ransomware attacks, enabling individuals with minimal expertise to launch sophisticated cyberattacks. Analyzing data from 2020 to 2024, th...
Research
Full-text available
Cybercrime syndicates have become increasingly sophisticated, with fraud networks evolving across international borders. In West Africa, Nigeria and Ghana have emerged as key hubs for organized cyber fraud, where criminals exploit technological advancements, weak regulatory frameworks, and socioeconomic factors to expand their operations. These net...
Article
Full-text available
Zero-day vulnerabilities are one of the most dangerous forms of cyber threats. A zero-day vulnerability refers to a flaw in software that is unknown to the software vendor or developer, leaving it exposed to malicious attacks. Such vulnerabilities are often exploited by hackers before they are detected or patched. AI has proven to be a promising to...
Article
Full-text available
Malicious actors continually exploit vulnerabilities in web systems to distribute malware, launch phishing attacks, steal sensitive information, and perpetrate various forms of cybercrime. Traditional signature-based methods for detecting malicious webpages often struggle to keep pace with the rapid evolution of malware and cyber threats. As a resu...
Article
Full-text available
This study examines the security vulnerabilities of cryptocurrency exchanges through a case study of the Bybit hack, aiming to identify systemic risks and propose frameworks for future-proofing digital asset safety. By analyzing the breach using qualitative methods-including news reports, blockchain forensics, and Bybit's official responses-the res...
Article
Full-text available
Phishing attacks are a major digital threat, impacting individuals and organizations globally. This review paper examines evolving anti-phishing strategies by analyzing five key techniques: URL blacklists, visual similarity detection, heuristic methods, machine learning models, and deep learning techniques. Each technique is evaluated for its mecha...
Article
Full-text available
As critical information systems become increasingly integral to national infrastructure, healthcare, finance, and governance, the need for robust cybersecurity measures has never been more urgent. Traditional cybersecurity approaches are often inadequate against the evolving sophistication of cyber threats, such as ransomware, phishing, and advance...
Research
Full-text available
Cross-border cybercrime has become a significant challenge in West Africa, with Nigeria and Ghana emerging as key players in fraudulent activities. This study examines the migration of fraud operations from Nigeria to Ghana, exploring the business strategies that cybercriminals employ to sustain and expand their operations. The research highlights...
Article
Full-text available
Email bots pose a significant threat to individuals and organizations, as they can be used to spread spam, malware, and phishing attacks. Detecting these bots is crucial for maintaining the security and integrity of email communication. This paper provides a comprehensive overview of email bot detection, including the types of bots, their character...
Research
Full-text available
The rapid expansion of cryptocurrency markets has provided new opportunities for financial innovation but has also led to a rise in fraudulent activities. Among the most prominent emerging threats is cryptocurrency fraud within cross-border crime networks, particularly between Nigeria and Ghana. These digital crime syndicates exploit the anonymity...
Research
Full-text available
Colonial histories have long left lasting socioeconomic disparities that persist into the digital age, influencing the justifications and motivations behind cybercrime, particularly fraud. This paper explores the intersection of historical grievances and contemporary cybercrime, examining how colonial injustice serves as a rationale for fraudulent...
Research
Full-text available
Digital asset scams have emerged as a significant threat to global financial systems, exploiting the decentralized and often opaque nature of digital currencies and blockchain technology. This paper explores how convicted fraudsters manipulate these systems, leveraging their knowledge of financial loopholes and regulatory gaps to orchestrate sophis...
Article
Full-text available
This scholarly treatise undertakes a meticulous examination of the pervasive banking frauds in India, analysing their substantial impacts on financial stability and the macroeconomic landscape. The study explores a gamut of fraud types, from traditional schemes like fraudulent loans and forged documents to advanced, technology-enabled frauds such a...
Article
Full-text available
The prevalence of cybercrime is directly proportional to the growth in the number of people using the internet. There has been evidence of phishing's extensive usage since its beginning, and it is now the most successful cyberattack vector. According to our findings, phishing is the most prevalent kind of cyberattack, and it employs several techniq...
Research
Full-text available
Cryptocurrency has revolutionized financial transactions, offering decentralization, anonymity, and borderless transfers. However, these very features have also made digital assets a prime target for fraudsters and financial criminals. This study explores the profiles, methods, and legal outcomes of convicted individuals involved in cryptocurrency-...
Research
Full-text available
The rapid growth of e-commerce and financial technology (FinTech) has revolutionized digital transactions, offering seamless payment solutions and financial services. However, this expansion has also heightened cybersecurity risks, making robust security measures crucial to protect sensitive financial data. Cyber threats such as data breaches, phis...
Research
Full-text available
Cryptocurrency fraud has become a significant financial crime, exploiting the anonymity, decentralization, and global reach of digital assets. As the adoption of cryptocurrencies continues to grow, so too do the fraudulent schemes designed to deceive investors, financial institutions, and unsuspecting individuals. This study examines how convicted...
Research
Full-text available
The rise of cryptocurrency has created new opportunities for financial transactions but has also facilitated cross-border fraud, particularly in regions with evolving regulatory frameworks. This study examines the increasing prevalence of cryptocurrency fraud originating from Nigeria and Ghana, where digital asset scammers exploit blockchain techno...
Chapter
Full-text available
In the digital era, educational institutions are increasingly vulnerable to a wide range of cybersecurity threats due to their expanding reliance on digital infrastructure. This chapter explores the growing importance of safeguarding sensitive data within these institutions and addresses various types of cyber threats, such as phishing attacks, ran...
Article
Full-text available
Phishing attacks remain one of the most significant cybersecurity threats, especially in email communications. Traditional detection methods, including signature-based and heuristic approaches, have limitations in identifying new and sophisticated phishing tactics. Natural Language Processing (NLP) techniques have shown promise in improving the acc...
Article
Full-text available
Since this is one of the most challenging tasks incyber security, many of them are affected by class imbalancewhen it comes to the performance of machine learning. Thispaper evaluates various strategies using a number of resampling-based approaches: ROS, RUS, and SMOTE-based methods inconjunction with XGBoost classifier techniques to solve such ani...
Article
Full-text available
The proliferation of digital technologies has necessitated the integration of sustainable cybersecurity practices to safeguard against escalating threats. This research explores the pivotal role of Artificial Intelligence (AI) and Machine Learning (ML) algorithms in fortifying cybersecurity frameworks for the digital age. By leveraging AI-driven th...
Article
Full-text available
This study aims to investigate cyber threat awareness among students from a rural-based university and propose a model to enhance their awareness. Students rely on information and communication technologies (ICTs) for educational and personal activities. Students in rural areas may have less cybersecurity education and awareness than their urban co...
Article
Full-text available
The digital age has made cyberspace indispensable for economic, social, and governmental functions, thus intensifying the critical need for robust cybersecurity. Our increasing dependence on digital platforms has exposed systems to a wide array of sophisticated cyber threats, including malware, phishing, distributed denial-of-service (DDoS) attacks...
Article
Full-text available
Cryptocurrency exchanges serve as crucial platforms for digital asset trading, making them primary targets for cybercriminals. The decentralized nature of cryptocurrencies, coupled with high liquidity and anonymity, presents unique security challenges that traditional financial institutions do not face. Despite advancements in blockchain security,...
Article
Full-text available
Phishing, a prevalent cyber threat, continues to jeopardize sensitive information by exploiting the vulnerabilities of digital platforms. This research investigates the escalating danger of phishing attacks, focusing on the creation of deceptive websites known as phishing domains. Leveraging machine learning algorithms, particularly supervised and...
Preprint
Full-text available
Phishing attacks, typically carried out by email, remain a significant cybersecurity threat with attackers creating legitimate-looking websites to deceive recipients into revealing sensitive information or executing harmful actions. In this paper, we propose {\bf EPhishCADE}, the first {\em privacy-aware}, {\em multi-dimensional} framework for {\bf...
Article
Full-text available
Financial fraud has evolved into a complex global threat, with identity-based fraud emerging as one of its most challenging forms. The rapid advancement of generative AI provides new opportunities to address these threats by enhancing fraud prevention and detection mechanisms. This paper examines the use of synthetic data generation powered by gene...
Article
Full-text available
Several explainable AI methods are available, but there is a lack of a systematic comparison of such methods. This paper contributes in this direction, by providing a framework for comparing alternative explanations in terms of complexity and robustness. We exemplify our proposal on a real case study in the cybersecurity domain, namely, phishing we...
Article
Full-text available
In the backdrop of the rapidly advancing global network informatization, cybercriminals frequently utilize a variety of phishing emails to launch attacks against numerous crucial organizations and information systems. Once these attacks succeed, they can inflict substantial damage on physical and digital systems as well as assets, resulting in the...
Article
Full-text available
Post-quantum cryptography (PQC) is a critical innovation for securing telemedicine patient data against emerging quantum computing threats. This study evaluates the vulnerabilities of existing encryption frameworks using data from the U.S. Department of Health & Human Services (HHS) Healthcare Data Breach Report. A weak correlation (r =-0.087) betw...
Article
Full-text available
In an era dominated by digital transformation, data security and regulatory compliance have become critical concerns for organizations worldwide. Data breaches, cyberattacks, and unauthorized access pose significant threats to sensitive information, leading to financial losses, reputational damage, and legal consequences. Compliance with regulation...
Preprint
Full-text available
Enterprises today face increasing cybersecurity threats that necessitate robust digital forensics and risk mitigation strategies. This paper explores these challenges through an imaginary case study of an organization, a global identity management and data analytics company handling vast customer data. Given the critical nature of its data assets,...
Preprint
Full-text available
The 2025 Bybit hack highlights the persistent security challenges within the cryptocurrency industry, exposing vulnerabilities in exchange security and user account protection. This paper examines the mechanisms of account takeover attacks, including phishing, credential stuffing, and session hijacking, and analyzes the broader risks they pose to i...
Article
Full-text available
This study systematically evaluates the vulnerabilities of modern web browsers using developed indices derived from the CVE database, including ICVE, ICVSS, IR and IT. These indices incorporate metrics such as vulnerability severity and risks, along with browser popularity, to enable a balanced comparison of browser security. The results highlight...
Article
Full-text available
The increasing adoption of cloud computing by federal agencies has introduced significant security challenges, necessitating robust strategies to protect sensitive government data. Traditional perimeter-based security models are no longer sufficient against evolving cyber threats, leading to the need for Zero Trust Architecture (ZTA), AI-driven thr...
Article
Full-text available
XSPA vulnerability can be attacked by stealing the cookie's information. In this case, it becomes utmost necessary to secure the information written in a cookie. A cookie contains a session ID that is a unique number generated by the server. This session ID must be a large random number so that no one can guess a valid session ID in real‐time. Nume...
Article
Full-text available
Phishing is a social engineering attack which intends to steal information from an intended victim by masquerading as a reputable source. It is a ubiquitous problem in modern day society and organizations, which is not likely to slow down. The Big Five psychological factors model is one which is widely used and has been shown to largely explain how...
Article
Full-text available
The protection of computer systems, networks, and data from harm, attacks, and unauthorized access is known as cybersecurity. It employs a range of devices, protocols, and techniques to safeguard data and fend off threats encountered online. Important objectives include protecting against online crimes like malware, phishing, and hacking as well as...
Article
Full-text available
With the rapid development of the internet, phishing attacks have become more diverse, making phishing website detection a key focus in cybersecurity. While machine learning and deep learning have led to various phishing URL detection methods, many remain incomplete, limiting accuracy. This paper proposes CSPPC-BiLSTM, a malicious URL detection mod...
Article
Full-text available
This paper presents the planning process for CyberLeap, a security awareness game for adolescents. In today's digital age, adolescents navigate a world filled with both opportunities and threats. CyberLeap adopts a novel approach to cybersecurity education in recognition of the significance of providing youngsters with the necessary skills to navig...
Article
Full-text available
The fast adoption of artificial intelligence within supply chain operations delivers multiple benefits including higher operational efficiency with automatic systems and better decision capabilities. The growth of these innovations creates additional security risks for companies. Artificial intelligence threats present in supply chains have surpass...
Article
Full-text available
In recent years, new malicious email attacks have emerged. We summarize two major challenges in the current field of malicious email detection using machine learning algorithms. (1) Current works on malicious email detection use different datasets and lack a unified and comprehensive open source dataset standard for evaluating detection performance...
Article
Full-text available
Ransomware attacks have experienced significant transformations through artificial intelligence which resulted in improved operational efficiency and advanced capabilities and adjustable behaviors. The cybercriminal world uses AI to create automated ransomware distributions as well as advance phishing tactics and boost encryption processes while ci...
Article
Full-text available
Although technology can be used for good reasons, the same can be exploited by cybercriminals for malicious intents and activities like phishing attacks. The use of phishing emails in such crimes makes it riveting to understand language's role in such a deceptive undertaking. Hence, this qualitative work comparatively analyzed the language correctn...
Article
Full-text available
The rapid adoption of digital technologies in Nigeria's commercial banking sector has revolutionized financial services, fostering increased efficiency and accessibility. However, this digital transformation has also heightened exposure to cybersecurity risks. Cyber threats, including phishing, ransomware, and insider attacks, pose significant chal...
Article
Full-text available
Cyber-Resilient Phishing Detection: BERT-Driven NLP for Advanced Email Security aSudip Diyasi, bAnkita Ghosh and cDipankar Dey a,cDepartment of Computer Application, Global Institute of Science & Technology, Haldia 721 657, West Bengal, India bDepartment of Computer Application, George College of Management and Science, Kolkata 700 141, West Bengal...
Article
Full-text available
Adversarial Machine Learning (AML) has emerged as a critical area of research in web data mining due to the increasing sophistication of cyber threats. Traditional machine learning-based cybersecurity solutions often struggle against evasive attack strategies, where adversaries manipulate input data to deceive detection models. This paper explores...
Technical Report
Full-text available
Sampath Bank PLC, a leading financial institution in Sri Lanka, has consistently demonstrated a commitment to leveraging innovative IT solutions to enhance its services and safeguard its operations. In 2021, the bank introduced the 'Touchless Withdrawal' feature, allowing customers to withdraw funds from ATMs without physical contact, thereby reduc...
Article
Full-text available
This article provides a comprehensive exploration of passwordless authentication, a rapidly evolving approach to digital security that eliminates the need for traditional Venkata Krishna Ramesh Kumar Koppireddy https://iaeme.com/Home/journal/IJITMIS 83 editor@iaeme.com passwords. It examines various types of passwordless methods, including biometri...
Article
Full-text available
This article provides a comprehensive exploration of passwordless authentication, a rapidly evolving approach to digital security that eliminates the need for traditional Venkata Krishna Ramesh Kumar Koppireddy https://iaeme.com/Home/journal/IJITMIS 83 editor@iaeme.com passwords. It examines various types of passwordless methods, including biometri...
Article
Full-text available
This article provides a comprehensive exploration of passwordless authentication, a rapidly evolving approach to digital security that eliminates the need for traditional passwords. It examines various types of passwordless methods, including biometrics, one-time passcodes, magic links, and hardware tokens, detailing their mechanisms and applicatio...
Article
Full-text available
The number of cybersecurity incidents is increasing, and the cost of a security breach has a catastrophic financial effect. The existing real estate information systems require more robust and resilient cybersecurity solutions to secure hardware, software, and databases. Cybersecurity often relies on user behavior. Phishing attacks and social engin...
Preprint
Full-text available
The rapid advancement of artificial intelligence (AI) has significantly expanded the attack surface for AI-driven cybersecurity threats, necessitating adaptive defense strategies. This paper introduces CyberSentinel, a unified, single-agent system for emergent threat detection, designed to identify and mitigate novel security risks in real time. Cy...
Article
Full-text available
Mobile devices have become an indispensable part of modern life, acting as the central hub for communication, work, entertainment, and personal management for billions of people worldwide. From smartphones to tablets, these devices store a vast amount of personal, financial, and professional information, making them increasingly attractive targets...