Access ease, mobility, portability, and improved speed have continued to ease the adoption of computing devices; while, consequently proliferating phishing attacks. These, in turn, have created mixed feelings in increased adoption and nosedived users’ trust level of devices. The study recruited 480-students, who were exposed to socially-engineered attack directives. Attacks were designed to retrieve personal data and entice participants to access compromised links. We sought to determine the risks of cybercrimes among the undergraduates in selected Nigerian universities, observe students’ responses and explore their attitudes before/after each attack. Participants were primed to remain vigilant to all forms of scams as we sought to investig...
Phishing attacks and other social manipulation attacks are an everyday occurrence for most workers i...
The use of the Internet and networking technologies continues to rise. Alongside the benefits that a...
Over the last decade, substantial progress has been made in understanding and mitigating phishing at...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engine...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
In an exploratory quasi-experimental study, 138 students recruited during a university orientation w...
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against mobile dev...
Phishing is one of the oldest and most flexible types of social engineering attacks and could be use...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
A leading cause of security breaches is a basic human vulnerability: our susceptibility to deception...
In an exploratory quasi-experimental observational study, 138 participants recruited during a univer...
In the past 25 years, the internet has grown and evolved from a niche networking technology, used al...
The worldwide popularity of social networking sites (SNSs) and the technical features they offer use...
Phishing attacks and other social manipulation attacks are an everyday occurrence for most workers i...
The use of the Internet and networking technologies continues to rise. Alongside the benefits that a...
Over the last decade, substantial progress has been made in understanding and mitigating phishing at...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engine...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
In an exploratory quasi-experimental study, 138 students recruited during a university orientation w...
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against mobile dev...
Phishing is one of the oldest and most flexible types of social engineering attacks and could be use...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
A leading cause of security breaches is a basic human vulnerability: our susceptibility to deception...
In an exploratory quasi-experimental observational study, 138 participants recruited during a univer...
In the past 25 years, the internet has grown and evolved from a niche networking technology, used al...
The worldwide popularity of social networking sites (SNSs) and the technical features they offer use...
Phishing attacks and other social manipulation attacks are an everyday occurrence for most workers i...
The use of the Internet and networking technologies continues to rise. Alongside the benefits that a...
Over the last decade, substantial progress has been made in understanding and mitigating phishing at...