[go: up one dir, main page]

Sharevski et al., 2022 - Google Patents

Phishing with malicious QR codes

Sharevski et al., 2022

View PDF
Document ID
410504680345720586
Author
Sharevski F
Devine A
Pieroni E
Jachim P
Publication year
Publication venue
Proceedings of the 2022 European Symposium on Usable Security

External Links

Snippet

The use of QR codes for malicious purposes was rather limited in the pre-COVID-19 world. That changed overnight, as the QR codes became a convenient go-between for sharing URLs, including malicious ones. This opens an attractive new way of phishing as QR codes …
Continue reading at arxiv.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Nurse Cybercrime and you: How criminals attack and the human factors that they seek to exploit
Sharevski et al. Phishing with malicious QR codes
Imgraben et al. Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
Althobaiti et al. I don’t need an expert! making url phishing features human comprehensible
Robila et al. Don't be a phish: steps in user education
Chen et al. Exploring internet security perceptions and practices in urban ghana
Yang et al. Use of phishing training to improve security warning compliance: Evidence from a field experiment
US20080168546A1 (en) Randomized images collection method enabling a user means for entering data from an insecure client-computing device to a server-computing device
Pande Introduction to cyber security
Das A risk-reduction-based incentivization model for human-centered multi-factor authentication
Kaushik et al. {GuardLens}: Supporting safer online browsing for people with visual impairments
Wu Fighting phishing at the user interface
Kaushik et al. Exploring the mechanisms of phishing
Sharma Preventing security breach in social media: Threats and prevention techniques
Jakobsson The death of the Internet
Dixon et al. Holding your hand on the danger Button: observing user phish detection strategies across Mobile and desktop
Gibson Who's really in your top 8: network security in the age of social networking
Klint Cybersecurity in home-office environments: An examination of security best practices post Covid
Shelke et al. Social networking: its uses and abuses
Kori et al. Information Security Awareness Among Postgraduate Students: A Study of Mangalore University
Sudha et al. Changes in High-School Student Attitude and Perception Towards Cybersecurity Through the Use of an Interactive Animated Visualization Framework
Semenikhina The problem of forming information hygiene skills in computer science lessons
McAnulty Phishing Attacks: A Plan to Educate Employees and Mitigate Risks
Bhatt Awareness of social media privacy among the staff at Solo Sokos Hotel Lahden Seurahuone
Grace The effects of age on users’ attitudes toward security and privacy in a social media environment: a quantitative study