This article presents an analysis of users' vulnerability to phishing attacks. The study was carried out using a self-prepared attack. A phishing attack was carried out on a group of 100 people. The subjects were divided into two groups of 50 people. The first group was attacked from a private, trusted account. The second group was attacked from a foreign email address. The attacked people were asked to complete the survey, its results and conclusions are presented in this article
Publication refers to SQL Injection attacks whose are one of the most dangerous in a cyberspace. Bas...
A cyber-attack is 201C;an attempt to gain illegal access to a computer or computer system for the pu...
This bachelor thesis is focused on the awareness of cyber security and human error. The aim of the w...
This article presents an analysis of users' vulnerability to phishing attacks. The study was carried...
The article discusses the issue of the security of Internet applications. The most popular types of ...
W niniejszej pracy licencjackiej skoncentrowano się na zagadnieniu phishingu, jego występowaniu w cy...
Application security is one of the key aspects necessary for its proper functioning. Ensuring securi...
This article is about web application security. Describes the most common types of web attacks. The ...
The article describes various protection methods of database and types of SQL Injection attacks. The...
V dnešní době jsou útoky phishingu na vzestupu a sofistikovanější než kdy předtím, protože jsou pro ...
Subject of security the most popular CMS platforms has been undertaken in the following thesis. Ther...
Tato diplomová práce řeší problematiku phishingu a možnosti detekce podvodných stránek s využitím fa...
Instant Messengers, though being around for decades, only in recent years they have managed to gain ...
Bakalářská práce se zabývá problematikou phishingu a vhodnou ochranou proti němu. V teoretické části...
Wraz z rozwojem nowoczesnych technologii komunikacyjnych pojawiło się również wiele zagrożeń z nimi ...
Publication refers to SQL Injection attacks whose are one of the most dangerous in a cyberspace. Bas...
A cyber-attack is 201C;an attempt to gain illegal access to a computer or computer system for the pu...
This bachelor thesis is focused on the awareness of cyber security and human error. The aim of the w...
This article presents an analysis of users' vulnerability to phishing attacks. The study was carried...
The article discusses the issue of the security of Internet applications. The most popular types of ...
W niniejszej pracy licencjackiej skoncentrowano się na zagadnieniu phishingu, jego występowaniu w cy...
Application security is one of the key aspects necessary for its proper functioning. Ensuring securi...
This article is about web application security. Describes the most common types of web attacks. The ...
The article describes various protection methods of database and types of SQL Injection attacks. The...
V dnešní době jsou útoky phishingu na vzestupu a sofistikovanější než kdy předtím, protože jsou pro ...
Subject of security the most popular CMS platforms has been undertaken in the following thesis. Ther...
Tato diplomová práce řeší problematiku phishingu a možnosti detekce podvodných stránek s využitím fa...
Instant Messengers, though being around for decades, only in recent years they have managed to gain ...
Bakalářská práce se zabývá problematikou phishingu a vhodnou ochranou proti němu. V teoretické části...
Wraz z rozwojem nowoczesnych technologii komunikacyjnych pojawiło się również wiele zagrożeń z nimi ...
Publication refers to SQL Injection attacks whose are one of the most dangerous in a cyberspace. Bas...
A cyber-attack is 201C;an attempt to gain illegal access to a computer or computer system for the pu...
This bachelor thesis is focused on the awareness of cyber security and human error. The aim of the w...