Smartphones are a central part of modern life and contain vast amounts of personal and professional data as well as access to sensitive features such as banking and financial apps. As such protecting our smartphones from unauthorised access is of great importance, and users prioritise this over protecting their devices against digital security threats. Previous research has explored user experiences of unauthorised access to their smartphone – though the vast majority of these cases involve an attacker who is known to the user and knows an unlock code for the device. We presented 374 participants with a scenario concerning the loss of their smartphone in a public place. Participants were allocated to one of 3 scenario groups where a differe...
Phishing attacks are on the increase. The fact that our ways of living, studying and working have dr...
<p>Phishing attacks target individuals or organizations to steal information (such as credentials) o...
Over the last decade, substantial progress has been made in understanding and mitigating phishing at...
Smartphones are a central part of modern life and contain vast amounts of personal and professional ...
Smartphones are a central part of modern life and contain vast amounts of personal and professional ...
Phishing continues to be a problem for both individuals and organisations, with billions of dollars ...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
International audiencePhishing attacks have been persistent for more than two decades despite mitiga...
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against mobile dev...
A leading cause of security breaches is a basic human vulnerability: our susceptibility to deception...
This research article published by IEEE, Volume: 7, 2019Phishing attacks have been persistent for m...
We present the first large-scale characterization of lateral phishing attacks, based on a dataset of...
To exploit the human as the "back door" to compromising well-protected information systems...
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against mobile dev...
Phishing is one of the many types of cybercrime targeting internet users. A phishing message is sent...
Phishing attacks are on the increase. The fact that our ways of living, studying and working have dr...
<p>Phishing attacks target individuals or organizations to steal information (such as credentials) o...
Over the last decade, substantial progress has been made in understanding and mitigating phishing at...
Smartphones are a central part of modern life and contain vast amounts of personal and professional ...
Smartphones are a central part of modern life and contain vast amounts of personal and professional ...
Phishing continues to be a problem for both individuals and organisations, with billions of dollars ...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
International audiencePhishing attacks have been persistent for more than two decades despite mitiga...
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against mobile dev...
A leading cause of security breaches is a basic human vulnerability: our susceptibility to deception...
This research article published by IEEE, Volume: 7, 2019Phishing attacks have been persistent for m...
We present the first large-scale characterization of lateral phishing attacks, based on a dataset of...
To exploit the human as the "back door" to compromising well-protected information systems...
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against mobile dev...
Phishing is one of the many types of cybercrime targeting internet users. A phishing message is sent...
Phishing attacks are on the increase. The fact that our ways of living, studying and working have dr...
<p>Phishing attacks target individuals or organizations to steal information (such as credentials) o...
Over the last decade, substantial progress has been made in understanding and mitigating phishing at...