The number of registered SIM cards and active mobile phone subscribers in Zambia in 2020 surpassed the population of the country. This clearly shows that mobile phones in Zambia have become part of everyday life easing not only the way people communicate but also the way people perform financial transactions owing to the integration of mobile phone systems with financial payment systems. This development has not come without a cost. Cyberattackers, using various social engineering techniques have jumped onto the bandwagon to defraud unsuspecting users. Considering the aforesaid, this paper presents a high-order analytical approach towards mobile phone-based social engineering cyberattacks (phishing, SMishing, and Vishing) in Zambia which se...
According to eMarketer researchers, the total number of smartphones in active use on the planet exc...
In 2001, mobile phone users were only 20% of the world’s population, but the number of mobile phone ...
The Covid-19 pandemic has kept almost everyone at home and forced them to perform online activities ...
Abstract: Social engineering is one of the most common attacking threats to the Mobile Money users d...
Advances in Internet-based mobile smartphones is a panacea in deployment of mobile applications acro...
This study aimed to evaluate the measures taken by telecommunication companies in preventing social ...
Mobile Smishing crime has continued to escalate globally due to technology enhancements and people's...
The information becomes a very precious thing which is owned by every person, organization or ...
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against mobile dev...
The use of mobile phones in African has seen a formidable growth. The use of mobile phones to perfor...
AbstractCurrent era is the mobile era and nearly almost every person is having a cell phone and if w...
This study examined the repercussions of cybercrime on the expansion of mobile money services in Kon...
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against mobile dev...
Viruses that infect cell phones especially Smartphone’s are beginning to emerge as a new obverse in ...
Smartphones are powerful handheld computers that allow users to connect in real-time with others aro...
According to eMarketer researchers, the total number of smartphones in active use on the planet exc...
In 2001, mobile phone users were only 20% of the world’s population, but the number of mobile phone ...
The Covid-19 pandemic has kept almost everyone at home and forced them to perform online activities ...
Abstract: Social engineering is one of the most common attacking threats to the Mobile Money users d...
Advances in Internet-based mobile smartphones is a panacea in deployment of mobile applications acro...
This study aimed to evaluate the measures taken by telecommunication companies in preventing social ...
Mobile Smishing crime has continued to escalate globally due to technology enhancements and people's...
The information becomes a very precious thing which is owned by every person, organization or ...
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against mobile dev...
The use of mobile phones in African has seen a formidable growth. The use of mobile phones to perfor...
AbstractCurrent era is the mobile era and nearly almost every person is having a cell phone and if w...
This study examined the repercussions of cybercrime on the expansion of mobile money services in Kon...
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against mobile dev...
Viruses that infect cell phones especially Smartphone’s are beginning to emerge as a new obverse in ...
Smartphones are powerful handheld computers that allow users to connect in real-time with others aro...
According to eMarketer researchers, the total number of smartphones in active use on the planet exc...
In 2001, mobile phone users were only 20% of the world’s population, but the number of mobile phone ...
The Covid-19 pandemic has kept almost everyone at home and forced them to perform online activities ...