Sharevski et al., 2022 - Google Patents
Phishing with malicious QR codesSharevski et al., 2022
View PDF- Document ID
- 410504680345720586
- Author
- Sharevski F
- Devine A
- Pieroni E
- Jachim P
- Publication year
- Publication venue
- Proceedings of the 2022 European Symposium on Usable Security
External Links
Snippet
The use of QR codes for malicious purposes was rather limited in the pre-COVID-19 world. That changed overnight, as the QR codes became a convenient go-between for sharing URLs, including malicious ones. This opens an attractive new way of phishing as QR codes …
- 200000000015 coronavirus disease 2019 0 abstract description 8
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nurse | Cybercrime and you: How criminals attack and the human factors that they seek to exploit | |
Sharevski et al. | Phishing with malicious QR codes | |
Imgraben et al. | Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users | |
Althobaiti et al. | I don’t need an expert! making url phishing features human comprehensible | |
Robila et al. | Don't be a phish: steps in user education | |
Chen et al. | Exploring internet security perceptions and practices in urban ghana | |
Yang et al. | Use of phishing training to improve security warning compliance: Evidence from a field experiment | |
US20080168546A1 (en) | Randomized images collection method enabling a user means for entering data from an insecure client-computing device to a server-computing device | |
Pande | Introduction to cyber security | |
Das | A risk-reduction-based incentivization model for human-centered multi-factor authentication | |
Kaushik et al. | {GuardLens}: Supporting safer online browsing for people with visual impairments | |
Wu | Fighting phishing at the user interface | |
Kaushik et al. | Exploring the mechanisms of phishing | |
Sharma | Preventing security breach in social media: Threats and prevention techniques | |
Jakobsson | The death of the Internet | |
Dixon et al. | Holding your hand on the danger Button: observing user phish detection strategies across Mobile and desktop | |
Gibson | Who's really in your top 8: network security in the age of social networking | |
Klint | Cybersecurity in home-office environments: An examination of security best practices post Covid | |
Shelke et al. | Social networking: its uses and abuses | |
Kori et al. | Information Security Awareness Among Postgraduate Students: A Study of Mangalore University | |
Sudha et al. | Changes in High-School Student Attitude and Perception Towards Cybersecurity Through the Use of an Interactive Animated Visualization Framework | |
Semenikhina | The problem of forming information hygiene skills in computer science lessons | |
McAnulty | Phishing Attacks: A Plan to Educate Employees and Mitigate Risks | |
Bhatt | Awareness of social media privacy among the staff at Solo Sokos Hotel Lahden Seurahuone | |
Grace | The effects of age on users’ attitudes toward security and privacy in a social media environment: a quantitative study |