Advertisement

The Art of Phishing

  • Teresa GuardaEmail author
  • Maria Fernanda Augusto
  • Isabel Lopes
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 918)

Abstract

Nowadays there are many threats that a company needs to protect itself. Everyone knows someone who has fallen for a coup by using an email, message or phone. People who pass by someone they trust, to extract data and money from the victim. These three ways are used to try convince someone to deliver accounts, credit card and document data in companies and at a particular level. According to Symantec, more than 6 hundreds of companies per day are targeted for Phishing, specifically Business E-Mail Compromise (BEC). In it, criminals pass through a central figure in the company, usually the CEO, and try to extract information or get employees to transfer money. This type of attack has generated in the last years losses of billions of dollars for the businesses affected. It is urgent that all company employees and individuals know as soon as possible what Phishing is and what steps to take.

Keywords

Phishing Spear phishing SMiShing QRishing Vishing Threats Security IoT 

References

  1. 1.
    Symantec Internet Security Threat Report. Symantec, vol. 23 (2018)Google Scholar
  2. 2.
    Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Hum.-Comput. Stud. 82, 69–82 (2015)CrossRefGoogle Scholar
  3. 3.
    Brill, J.A., McGeehan, R., Muriello, D.G.: U.S. Patent No. 9,578,499, Washington, DC (2017)Google Scholar
  4. 4.
    Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Wirel. Netw. 20(8), 2481–2501 (2014)CrossRefGoogle Scholar
  5. 5.
    Mohammad, R.M., Thabtah, F., McCluskey, L.: Tutorial and critical analysis of phishing websites methods. Comput. Sci. Rev. 17, 1–24 (2015)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Ariu, D., Frumento, E., Fumera, G.: Social engineering 2.0: a foundational work. In: Proceedings of the Computing Frontiers Conference (2017)Google Scholar
  7. 7.
    Gascon, H., Ullrich, S., Stritter, B., Rieck, K.: Reading between the lines: content-agnostic detection of spear-phishing emails. In: International Symposium on Research in Attacks, Intrusions, and Defenses (2018)Google Scholar
  8. 8.
    Chiew, K.L., Yong, K.S.C., Tan, C.L.: A survey of phishing attacks: their types, vectors and technical approaches. Expert Syst. Appl. 106, 1–20 (2018)CrossRefGoogle Scholar
  9. 9.
    Rzeszut, E., Bachrach, D.: 10 don’ts on your digital devices: the non-techie’s survival guide to cyber security and privacy. Apress (2014)Google Scholar
  10. 10.
    Dhiman, P., Wajid, S.A., Quraishi, F.F.: A comprehensive study of social engineering - the art of mind hacking. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2(6), 543–548 (2017)Google Scholar
  11. 11.
    Oliveira, D., Rocha, H., Yang, H., Ellis, D., Dommaraju, S., Muradoglu, M., Weir, D., Soliman, A., Lin, T., Ebner, N.: Dissecting spear phishing emails for older vs young adults: on the interplay of weapons of influence and life domains in predicting susceptibility to phishing. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (2017)Google Scholar
  12. 12.
    Falkner, S., Kieseberg, P., Simos, D.E., Traxler, C., Weippl, E.: Usable cryptographic QR codes. In: IEEE International Conference on Industrial Technology (ICIT) (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Teresa Guarda
    • 1
    • 2
    • 3
    Email author
  • Maria Fernanda Augusto
    • 1
    • 4
  • Isabel Lopes
    • 3
    • 5
  1. 1.Universidad Estatal Península de Santa Elena – UPSELa LibertadEcuador
  2. 2.Universidad de las Fuerzas Armadas-ESPESangolquiEcuador
  3. 3.Algoritmi CentreMinho UniversityGuimarãesPortugal
  4. 4.BITrum-Research GroupLeónSpain
  5. 5.UNIAG (Applied Management Research Unit)Polytechnic Institute of BragançaBragançaPortugal

Personalised recommendations