77 results on '"Phishing -- Analysis"'
Search Results
2. Studies from Nanjing University of Science and Technology Yield New Information about Information Technology (Resource Knowledge-driven Heterogeneous Graph Learning for Website Fingerprinting)
3. DoT Directs Telcos to Reverify 6.8 Lakh Suspect Mobile Connections
4. DoT, MHA and State Police join hands to combat cyber fraudsters
5. Govt. Response to CoWIN Data Leak Raises Concerns Over Digital Security
6. Researcher at Kaunas University of Technology Releases New Data on Applied Sciences (Experimental Evaluation of Possible Feature Combinations for the Detection of Fraudulent Online Shops)
7. New Research Reveals 307% Increase in ATO and ID Fraud Due to Generative AI and Deepfakes
8. Lowering the Bar(d)? Check Point Research's security analysis spurs concerns over Google Bard's limitations
9. Julie Elliott ask the Secretary of State for the Home Department, whether she has made an assessment of the level of threat to people over the age of 65 of being targeted by online (a) data phishing and (b) other scam attacks
10. Online scams on rise; cost Oklahomans $52M last year
11. Unit created to analyse rising cases of cybercrime
12. New Computer Science Research from Cybersecurity Laboratory Described (Unbalanced Web Phishing Classification through Deep Reinforcement Learning)
13. Pharming highlights interim data from rare immune deficiency study
14. Mr Barry Sheerman ask the Secretary of State for the Home Department, if she will make an assessment of the impact of online (a) scams and (b) fraud on vulnerable adults in the last 12 months
15. NEW ANALYSIS SHOWS ADULTS UNDER 60 REPORT LOSSES TO ONLINE SHOPPING SCAMS, INVESTMENT SCAMS MORE THAN OLDER ADULTS
16. Miercom Analysis: WatchGuard AuthPoint Leads in MFA Functionality, Ease of Use and Affordability
17. University of Defence Researcher Adds New Study Findings to Research in Computers (How to Understand Phishing)
18. Research from Birla Institute of Technology and Science Pilani in the Area of Algorithms Described (Hybrid Approach for Phishing Website Detection Using Classification Algorithms)
19. VMRay Unveils Advanced Machine Learning Capabilities to Accelerate Threat Detection and Analysis
20. Microsoft releases analysis of Web3 'ice phishing' attack
21. Influence techniques in phishing attacks: an examination of vulnerability and resistance
22. Fraudsters in Hong Kong shift focus from logistic to communities and gaming, TransUnion analyses reveals
23. Digital escrow provider Castler gains traction amid rising online frauds
24. It won't happen to me: Promoting secure behaviour among internet users
25. The Internet: exacerbating white-collar crime
26. SlashNext Enhances Listing on Palo Alto Networks Cortex XSOAR Marketplace
27. SlashNext Enhances Listing on Palo Alto Networks Cortex XSOAR Marketplace
28. One Year after COVID-19, New TransUnion Research Shows Digital Fraud Attempts Against Businesses Have Increased by 46%
29. Cyber Crime: 'People Lost Over Rs 1.4 Crore To Fraudsters In One Month'
30. Studies from National Engineering College Add New Findings in the Area of Machine Learning (Intelligent Antiphishing Framework To Detect Phishing Scam: a Hybrid Classification Approach)
31. Researchers at University of Ilorin Publish New Data on Science and Technology (Improving the phishing website detection using empirical analysis of Function Tree and its variants)
32. Remote Work, Data Breaches And Cybersecurity Considerations During COVID-19
33. Remote Work, Data Breaches And Cybersecurity Considerations During COVID-19
34. Address And Web Domain Analysis In The Fight Against Phishing
35. Most Effective Phishing Tactics Revealed by Bob's Business Analysis
36. Address And Web Domain Analysis In The Fight Against Phishing
37. Phishing tackled: scam emails, supposedly from trusted brands, are wreaking havoc online. We explain what to do to avoid getting hooked by the phishers
38. Identity crisis: don't let crime be committed in your name. We expose the tricks of the online identity thieves to help you protect yourself from hijackers
39. LinkedIn Accounts for More than Half of Social Media Phishing Emails in Q2 2019, According to KnowBe4 Findings
40. Featurespace Introduces Adaptive Behavioral Biometrics to Solve Complex Fraud Attacks in Digital Channels
41. Sextortion an Emerging Cyber Threat for Business and Employees: Barracuda Study
42. Here to Help; How to Spot a Phishing Attempt
43. Gift-Card Phishing Scheme Targets Professors' Zeal to Please the Dean
44. Cofense Malware Review Covers Trends and Predictions on Malware, Delivery Methods and Trending Attacks
45. Kaspersky Lab: Financial Phishing Accounts for Over 50% of All Phishing Attacks for the First Time
46. GONE PHISHING
47. Beyond the Phish Report from Wombat Security Reveals the No. 1 Problem Area for End-Users is Protecting Confidential Information
48. CMO Council Analyzes Data on Cyber Crime
49. Securing remote access at Genesis Health System
50. Securing the Internet of Things: some steps businesses can take to better secure their own organization as well as their customers and employees
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.