With so much of our lives digital, online, and not entirely under our control, we risk losing access to our communications, reputation, and data. Recent years have brought a rash of high-profile account compromises, but account hijacking is not limited to high-profile accounts. In this paper, we report results of a survey about people’s experiences with and attitudes toward account hijacking. The problem is widespread; 30 % of our 294 participants had an email or social networking account accessed by an unauthorized party. Five themes emerged from our results: (1) compromised accounts are often valuable to victims, (2) attackers are mostly unknown, but sometimes known, to victims, (3) users acknowledge some responsibility for keeping their ...
From light bulbs to smart locks, IoT is increasingly embed- ded into our homes and lives. This opens...
Smartphones store large amounts of sensitive data, such as SMS messages, photos, or email. In this p...
Our daily lives now involve e-commerce, and because of how convenient it is to use them, e-commerce ...
Unauthorized physical access to personal devices by people known to the owner of the device is a com...
Account hijacking, i.e. illegitimately accessing someone else’s personal online account, is on the r...
Account hijacking, i.e. illegitimately accessing someone else’s personal online account, is on the r...
Authentication is an everyday practice in the information economy. When people use Facebook, Google,...
Authentication is an everyday practice in the information economy. When people use Facebook, Google,...
A wide-range of personal and sensitive information are stored in users’ online accounts. Losing acce...
A person's online security setup is tied to the security of their individual accounts. Some accounts...
In this study we expose the serious large-scale threat of crim-inal account hijacking and the result...
Online accounts are inherently valuable resources—both for the data they contain and the reputation ...
Online security issues continue to grow as a concern, amplified by the coronavirus pandemic. The cur...
Today security concerns are on the rise in all area such as banks, government organizations, busines...
<div>3MT presented at the 2017 Defence and Security Doctoral Symposium.</div><div><br></div><div>Acc...
From light bulbs to smart locks, IoT is increasingly embed- ded into our homes and lives. This opens...
Smartphones store large amounts of sensitive data, such as SMS messages, photos, or email. In this p...
Our daily lives now involve e-commerce, and because of how convenient it is to use them, e-commerce ...
Unauthorized physical access to personal devices by people known to the owner of the device is a com...
Account hijacking, i.e. illegitimately accessing someone else’s personal online account, is on the r...
Account hijacking, i.e. illegitimately accessing someone else’s personal online account, is on the r...
Authentication is an everyday practice in the information economy. When people use Facebook, Google,...
Authentication is an everyday practice in the information economy. When people use Facebook, Google,...
A wide-range of personal and sensitive information are stored in users’ online accounts. Losing acce...
A person's online security setup is tied to the security of their individual accounts. Some accounts...
In this study we expose the serious large-scale threat of crim-inal account hijacking and the result...
Online accounts are inherently valuable resources—both for the data they contain and the reputation ...
Online security issues continue to grow as a concern, amplified by the coronavirus pandemic. The cur...
Today security concerns are on the rise in all area such as banks, government organizations, busines...
<div>3MT presented at the 2017 Defence and Security Doctoral Symposium.</div><div><br></div><div>Acc...
From light bulbs to smart locks, IoT is increasingly embed- ded into our homes and lives. This opens...
Smartphones store large amounts of sensitive data, such as SMS messages, photos, or email. In this p...
Our daily lives now involve e-commerce, and because of how convenient it is to use them, e-commerce ...