This study set out to identify methods that phishers employ to attack unsuspecting internet users. The aim was for the purpose of minimizing their effects on websites as well as users. Eleven statements, namely, Emails, Web based, Malware based, Internet Relay Chats (IRC’s) Man in the middle (MITM) Domain Name Server (DNS) based, Impersonate, Forward Attack, Pop-up attack, Voice Phishing and Mobile Phishing, depicting methods used by phishers to carry out their attacks against unsuspecting victims who are the internet users were presented to respondents to indicate their level of agreement. The result showed that only two, (MITM and Web based) out of the eleven were not significant while the remaining nine were significant. That means only ...
Phishing attacks are based on obtaining desired information from users quickly and easily with the h...
A cyber-attack is 201C;an attempt to gain illegal access to a computer or computer system for the pu...
The fight against phishing has resulted in several anticipating phishing prevention techniques. Howe...
Due to the rapid development in the technologies related to the Internet, users have changed their p...
The Internet has become an essential component of our everyday social and financial activities. Inte...
Phishing is a scam that has been around for a long time and has only grown in popularity. In this st...
Internet dragged more than half of the world's population into the cyber world. Unfortunately, with ...
The Internet has become an essential component of our everyday social and financial activities. Inte...
Abstract: A web service is one of the most important Internet communications software services. Usin...
Phishing is a major source of insecurity within the internet. This is a kind of fraud in which an in...
In the last few decays, phishing tricks have swiftly grown posing enormous threat to worldwide Inter...
Abstract: The Internet has a remarkable platform for common people communication. People with crimin...
Abstract — Phishing is the act of attempting to acquire sensitive information such as usernames, pas...
The development of computer networks today has increased rapidly. This can be seen based on the tren...
Phishing is a novel kind of website/network attack which makes a deceitful attempt and influences th...
Phishing attacks are based on obtaining desired information from users quickly and easily with the h...
A cyber-attack is 201C;an attempt to gain illegal access to a computer or computer system for the pu...
The fight against phishing has resulted in several anticipating phishing prevention techniques. Howe...
Due to the rapid development in the technologies related to the Internet, users have changed their p...
The Internet has become an essential component of our everyday social and financial activities. Inte...
Phishing is a scam that has been around for a long time and has only grown in popularity. In this st...
Internet dragged more than half of the world's population into the cyber world. Unfortunately, with ...
The Internet has become an essential component of our everyday social and financial activities. Inte...
Abstract: A web service is one of the most important Internet communications software services. Usin...
Phishing is a major source of insecurity within the internet. This is a kind of fraud in which an in...
In the last few decays, phishing tricks have swiftly grown posing enormous threat to worldwide Inter...
Abstract: The Internet has a remarkable platform for common people communication. People with crimin...
Abstract — Phishing is the act of attempting to acquire sensitive information such as usernames, pas...
The development of computer networks today has increased rapidly. This can be seen based on the tren...
Phishing is a novel kind of website/network attack which makes a deceitful attempt and influences th...
Phishing attacks are based on obtaining desired information from users quickly and easily with the h...
A cyber-attack is 201C;an attempt to gain illegal access to a computer or computer system for the pu...
The fight against phishing has resulted in several anticipating phishing prevention techniques. Howe...