The objective of this study is to get insight into the effectiveness of an information campaign to counter a social engineering attack via the telephone. Four different offenders phoned 48 employees and made them believe that their PC was distributing spam emails. Targets were told that this unfortunate situation could be solved by downloading and executing software from a website (i.e. an untrusted one). A total of 46.15 % of the employees not exposed to the intervention followed the instructions of the offender. This was significantly different to those exposed to an intervention 1 week prior to the attack (9.1%); however there was no effect for those exposed to an intervention 2 weeks prior to the attack (54.6%). This research suggests t...
Given the major technological development that has been made in the last decades, companies and orga...
Social engineering is the use of trickery, deception, persuasion, emotional manipulation, impersonat...
Social Engineering (ES) is now considered the great security threat to people and organizations. Eve...
The objective of this study is to get insight into the effectiveness of an information campaign to c...
Objectives: The aim of the current study is to explore to what extent an intervention reduces the ef...
The advent of mobile technologies and social network applications has led to an increase in maliciou...
Social engineering attacking method is a serious threat that targets the human element of informatio...
The information becomes a very precious thing which is owned by every person, organization or ...
The aim of this studywas to explore the extent towhich persuasion principles are used in successful ...
This study aimed to evaluate the measures taken by telecommunication companies in preventing social ...
Social Engineering (ES) is now considered the great security threat to people and organizations. Eve...
The advancements in digital communication technology have made communication between humans more acc...
The amount of Internet fraud has grown exponentially over the last decade. Although computer securit...
Part 3: WISE 6International audienceSocial engineering is a method of attack involving the exploitat...
Social engineering is as old as human beings and has been used for a thousand years in some way such...
Given the major technological development that has been made in the last decades, companies and orga...
Social engineering is the use of trickery, deception, persuasion, emotional manipulation, impersonat...
Social Engineering (ES) is now considered the great security threat to people and organizations. Eve...
The objective of this study is to get insight into the effectiveness of an information campaign to c...
Objectives: The aim of the current study is to explore to what extent an intervention reduces the ef...
The advent of mobile technologies and social network applications has led to an increase in maliciou...
Social engineering attacking method is a serious threat that targets the human element of informatio...
The information becomes a very precious thing which is owned by every person, organization or ...
The aim of this studywas to explore the extent towhich persuasion principles are used in successful ...
This study aimed to evaluate the measures taken by telecommunication companies in preventing social ...
Social Engineering (ES) is now considered the great security threat to people and organizations. Eve...
The advancements in digital communication technology have made communication between humans more acc...
The amount of Internet fraud has grown exponentially over the last decade. Although computer securit...
Part 3: WISE 6International audienceSocial engineering is a method of attack involving the exploitat...
Social engineering is as old as human beings and has been used for a thousand years in some way such...
Given the major technological development that has been made in the last decades, companies and orga...
Social engineering is the use of trickery, deception, persuasion, emotional manipulation, impersonat...
Social Engineering (ES) is now considered the great security threat to people and organizations. Eve...