-
2
-
-
84951909884
-
-
Anatomy of an attack. Available online: [last accessed 17.07.13]
-
Anatomy of an attack. Available online: http://blogs.rsa.com/anatomy-of-an-attack/ [last accessed 17.07.13].
-
-
-
-
4
-
-
78249282277
-
Abusing social networks for automated user profiling
-
Springer
-
M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel Abusing social networks for automated user profiling Recent advances in intrusion detection 2010 Springer 422 441
-
(2010)
Recent Advances in Intrusion Detection
, pp. 422-441
-
-
Balduzzi, M.1
Platzer, C.2
Holz, T.3
Kirda, E.4
Balzarotti, D.5
Kruegel, C.6
-
7
-
-
84945205037
-
A look at targeted attacks through the lense of an NGO
-
USENIX Association San Diego, CA
-
S.L. Blond, A. Uritesc, C. Gilbert, Z.L. Chua, P. Saxena, and E. Kirda A look at targeted attacks through the lense of an NGO 23rd USENIX Security Symposium (USENIX Security 14) Aug. 2014 USENIX Association San Diego, CA
-
(2014)
23rd USENIX Security Symposium (USENIX Security 14)
-
-
Blond, S.L.1
Uritesc, A.2
Gilbert, C.3
Chua, Z.L.4
Saxena, P.5
Kirda, E.6
-
9
-
-
76649137380
-
Social networks and context-aware spam
-
ACM New York, NY, USA
-
G. Brown, T. Howe, M. Ihbe, A. Prakash, and K. Borders Social networks and context-aware spam Proceedings of the 2008 ACM conference on Computer supported cooperative work, CSCW '08 2008 ACM New York, NY, USA 403 412
-
(2008)
Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW '08
, pp. 403-412
-
-
Brown, G.1
Howe, T.2
Ihbe, M.3
Prakash, A.4
Borders, K.5
-
10
-
-
79961035117
-
Analyzing inter-application communication in android
-
ACM New York, NY, USA
-
E. Chin, A.P. Felt, K. Greenwood, and D. Wagner Analyzing inter-application communication in android Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11 2011 ACM New York, NY, USA 239 252
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
13
-
-
84951910028
-
Protect against social engineering attacks
-
[Retrieved 2008-11-13]
-
Gartner Inc Protect against social engineering attacks Gart Secur Webletter 1 1 Feb. 2002 [Retrieved 2008-11-13]
-
(2002)
Gart Secur Webletter
, vol.1
, Issue.1
-
-
Inc, G.1
-
14
-
-
84951909719
-
-
Google hack attack was ultra sophisticated. Available online: [last accessed 17.07.13]
-
Google hack attack was ultra sophisticated. Available online: http://www.wired.com/threatlevel/2010/01/operation-aurora/ [last accessed 17.07.13].
-
-
-
-
15
-
-
34748849150
-
A multi-level defense against social engineering
-
D. Gragg A multi-level defense against social engineering SANS Reading Room March, 13, 2003
-
(2003)
SANS Reading Room
-
-
Gragg, D.1
-
16
-
-
84897771350
-
Social engineering fundamentals, Part I: Hacker tactics
-
S. Granger Social engineering fundamentals, Part I: hacker tactics SecurityFocus 2001
-
(2001)
SecurityFocus
-
-
Granger, S.1
-
17
-
-
77957955892
-
Attack surfaces: A taxonomy for attacks on cloud services
-
N. Gruschka, and M. Jensen Attack surfaces: a taxonomy for attacks on cloud services IEEE CLOUD 2010 276 279
-
(2010)
IEEE CLOUD
, pp. 276-279
-
-
Gruschka, N.1
Jensen, M.2
-
18
-
-
84856038557
-
Phishing as a tragedy of the commons
-
Lake Tahoe, CA
-
C. Herley, and D. Florencio Phishing as a tragedy of the commons NSPW 2008 2008 Lake Tahoe, CA
-
(2008)
NSPW 2008
-
-
Herley, C.1
Florencio, D.2
-
19
-
-
70849122971
-
Towards automating social engineering using social networking sites
-
CSE'09. International Conference on IEEE
-
M. Huber, S. Kowalski, M. Nohlberg, and S. Tjoa Towards automating social engineering using social networking sites Computational Science and Engineering, 2009 CSE'09. International Conference on vol. 3 2009 IEEE 117 124
-
(2009)
Computational Science and Engineering, 2009
, vol.3
, pp. 117-124
-
-
Huber, M.1
Kowalski, S.2
Nohlberg, M.3
Tjoa, S.4
-
20
-
-
84855658209
-
Social snapshots: Digital forensics for online social networks
-
M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek, and E. Weippl Social snapshots: digital forensics for online social networks Proceedings of the 27th Annual Computer Security Applications Conference 2011
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference
-
-
Huber, M.1
Mulazzani, M.2
Leithner, M.3
Schrittwieser, S.4
Wondracek, G.5
Weippl, E.6
-
21
-
-
79955551180
-
Friend-in-the-middle attacks: Exploiting social networking sites for spam
-
M. Huber, M. Mulazzani, E. Weippl, G. Kitzler, and S. Goluch Friend-in-the-middle attacks: exploiting social networking sites for spam IEEE Internet Comput 15 3 2011 28 34
-
(2011)
IEEE Internet Comput
, vol.15
, Issue.3
, pp. 28-34
-
-
Huber, M.1
Mulazzani, M.2
Weippl, E.3
Kitzler, G.4
Goluch, S.5
-
23
-
-
79959930140
-
Reverse social engineering attacks in online social networks
-
D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu Reverse social engineering attacks in online social networks Detection of Intrusions and Malware, and Vulnerability Assessment 2011 55 74
-
(2011)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 55-74
-
-
Irani, D.1
Balduzzi, M.2
Balzarotti, D.3
Kirda, E.4
Pu, C.5
-
25
-
-
34848911641
-
Social phishing
-
T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer Social phishing Commun ACM 50 10 2007 94 100
-
(2007)
Commun ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
27
-
-
84951910074
-
-
Online Available at: [last accessed 21.01.14]
-
R. King Twitter: more than 250K user accounts have been compromised Online 2013 Available at: http://www.zdnet.com/twitter-more-than-250k-user-accounts-have-been-compromised-7000010711/ [last accessed 21.01.14]
-
(2013)
Twitter: More Than 250K User Accounts Have Been Compromised
-
-
King, R.1
-
28
-
-
84893276970
-
Social engineering attacks on the knowledge worker
-
ACM New York, NY, USA
-
K. Krombholz, H. Hobel, M. Huber, and E. Weippl Social engineering attacks on the knowledge worker Proceedings of the 6th International Conference on Security of Information and Networks, SIN '13 2013 ACM New York, NY, USA 28 35
-
(2013)
Proceedings of the 6th International Conference on Security of Information and Networks, SIN '13
, pp. 28-35
-
-
Krombholz, K.1
Hobel, H.2
Huber, M.3
Weippl, E.4
-
29
-
-
84893246018
-
Fake identities in social media: A case study on the sustainability of the Facebook business model
-
K. Krombholz, D. Merkl, and E. Weippl Fake identities in social media: a case study on the sustainability of the Facebook business model J Sci Study Relig 4 2 2012 175 212
-
(2012)
J Sci Study Relig
, vol.4
, Issue.2
, pp. 175-212
-
-
Krombholz, K.1
Merkl, D.2
Weippl, E.3
-
30
-
-
35048876774
-
Self-efficacy, training effectiveness, and deception detection: A longitudinal study of lie detection training
-
K. Marett, D. Biros, and M. Knode Self-efficacy, training effectiveness, and deception detection: a longitudinal study of lie detection training Lect Notes Comput Sci 3073 2004 187 200
-
(2004)
Lect Notes Comput Sci
, vol.3073
, pp. 187-200
-
-
Marett, K.1
Biros, D.2
Knode, M.3
-
31
-
-
84951909841
-
-
Microsoft hacked: joins Apple, Facebook, Twitter - InformationWeek. online: [last accessed 10.07.13]
-
Microsoft hacked: joins Apple, Facebook, Twitter - InformationWeek. Available online: http://www.informationweek.com/security/\Attackacks/microsoft-hacked-joins-apple-facebook-tw/240149323 [last accessed 10.07.13].
-
-
-
-
32
-
-
84867375385
-
Byod: Security and privacy considerations
-
K. Miller, J. Voas, and G. Hurlburt Byod: security and privacy considerations IT Prof 14 5 2012 53 55
-
(2012)
IT Prof
, vol.14
, Issue.5
, pp. 53-55
-
-
Miller, K.1
Voas, J.2
Hurlburt, G.3
-
35
-
-
84863932631
-
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
-
USENIX Association Berkeley, CA, USA
-
M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl Dark clouds on the horizon: using cloud storage as attack vector and online slack space Proceedings of the 20th USENIX conference on Security, SEC'11 2011 USENIX Association Berkeley, CA, USA 5
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 5
-
-
Mulazzani, M.1
Schrittwieser, S.2
Leithner, M.3
Huber, M.4
Weippl, E.5
-
36
-
-
84893294050
-
-
Online Available at: [last accessed 04.07.13]
-
R. Nelson Methods of hacking: social engineering Online 2008 Available at: http://www.isr.umd.edu/gemstone/infosec/ver2/papers/socialeng.html [last accessed 04.07.13]
-
(2008)
Methods of Hacking: Social Engineering
-
-
Nelson, R.1
-
37
-
-
84893295799
-
Phishing for the truth: A scenario-based experiment of users' behavioural response to emails
-
L. Janczewski, H. Wolfe, S. Shenoi, IFIP Advances in Information and Communication Technology Springer Berlin Heidelberg
-
K. Parsons, A. McCormac, M. Pattinson, M. Butavicius, and C. Jerram Phishing for the truth: a scenario-based experiment of users' behavioural response to emails L. Janczewski, H. Wolfe, S. Shenoi, Security and privacy protection in information processing systems IFIP Advances in Information and Communication Technology vol. 405 2013 Springer Berlin Heidelberg 366 378
-
(2013)
Security and Privacy Protection in Information Processing Systems
, vol.405
, pp. 366-378
-
-
Parsons, K.1
McCormac, A.2
Pattinson, M.3
Butavicius, M.4
Jerram, C.5
-
38
-
-
84893290133
-
-
[last accessed 01.07.13]
-
N. Perlroth Chinese hackers infiltrate New York Times computers Jan. 2013 Available at: https://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html [last accessed 01.07.13]
-
(2013)
Chinese Hackers Infiltrate New York Times Computers
-
-
Perlroth, N.1
-
39
-
-
84863138661
-
Plagiarizing smartphone applications: Attack strategies and defense techniques
-
Springer-Verlag Berlin, Heidelberg
-
R. Potharaju, A. Newell, C. Nita-Rotaru, and X. Zhang Plagiarizing smartphone applications: attack strategies and defense techniques Proceedings of the 4th International Conference on Engineering Secure Software and Systems, ESSoS'12 2012 Springer-Verlag Berlin, Heidelberg 106 120
-
(2012)
Proceedings of the 4th International Conference on Engineering Secure Software and Systems, ESSoS'12
, pp. 106-120
-
-
Potharaju, R.1
Newell, A.2
Nita-Rotaru, C.3
Zhang, X.4
-
40
-
-
34748869064
-
An investigation of heuristics of human judgment in detecting deception and potential implications in countering social engineering
-
IEEE
-
T. Qin, and J. Burgoon An investigation of heuristics of human judgment in detecting deception and potential implications in countering social engineering Intell Secur Inform 2007 152 159 IEEE
-
(2007)
Intell Secur Inform
, pp. 152-159
-
-
Qin, T.1
Burgoon, J.2
-
41
-
-
81455143616
-
Who can you trust in the cloud? A review of security issues within cloud computing
-
ACM New York, NY, USA
-
J.C. Roberts II, and W. Al-Hamdani Who can you trust in the cloud? A review of security issues within cloud computing Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD '11 2011 ACM New York, NY, USA 15 19
-
(2011)
Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD '11
, pp. 15-19
-
-
Roberts, I.I.J.C.1
Al-Hamdani, W.2
-
42
-
-
84874124033
-
Guess who is texting you? Evaluating the security of smartphone messaging applications
-
S. Schrittwieser, P. Fruehwirt, P. Kieseberg, M. Leithner, M. Mulazzani, M. Huber, and et al. Guess who is texting you? Evaluating the security of smartphone messaging applications Network and Distributed System Security Symposium (NDSS 2012) 2 2012
-
(2012)
Network and Distributed System Security Symposium (NDSS 2012)
-
-
Schrittwieser, S.1
Fruehwirt, P.2
Kieseberg, P.3
Leithner, M.4
Mulazzani, M.5
Huber, M.6
-
43
-
-
84951910091
-
-
SocialEngineer. What is phishing - paypal phishing examples. online: [last accessed 04.07.13]
-
SocialEngineer. What is phishing - paypal phishing examples. Available online: http://www.social-engineer.org/wiki/archives/Phishing/Phishing-PayPal.html [last accessed 04.07.13].
-
-
-
-
44
-
-
84951909853
-
-
online: [last accessed 13.07.13]
-
Sophos Sophos Facebook id probe shows 41% of users happy to reveal all to potential identity thieves 2007 Available online: http://www.sophos.com/en-us/press-office/press-releases/2007/08/facebook.aspx [last accessed 13.07.13]
-
(2007)
Network and Distributed System Security Symposium (NDSS 2012)
-
-
Sophos1
-
45
-
-
41949111662
-
Using cartoons to teach internet security
-
S. Srikwan Using cartoons to teach internet security Cryptologia 32 2 2008 137 154
-
(2008)
Cryptologia
, vol.32
, Issue.2
, pp. 137-154
-
-
Srikwan, S.1
-
46
-
-
72849151945
-
-
[last accessed 02.07.13]
-
S. Stasiukonis Social engineering, the USB way 2006 Available at: http://www.darkreading.com/security/perimeter/show Article.jhtml?articleID=208803634 [last accessed 02.07.13]
-
(2006)
Social Engineering, the USB Way
-
-
Stasiukonis, S.1
-
47
-
-
79959891780
-
Facebook immune system
-
ACM New York, NY, USA
-
T. Stein, E. Chen, and K. Mangla Facebook immune system Proceedings of the 4th Workshop on Social Network Systems, SNS '11 2011 ACM New York, NY, USA 8:1 8:8
-
(2011)
Proceedings of the 4th Workshop on Social Network Systems, SNS '11
, pp. 81-88
-
-
Stein, T.1
Chen, E.2
Mangla, K.3
-
48
-
-
77951996290
-
The psychology of password management: A tradeoff between security and convenience
-
L. Tam, M. Glassman, and M. Vandenwauver The psychology of password management: a tradeoff between security and convenience Behav Inf Technol 29 3 May 2010 233 244
-
(2010)
Behav Inf Technol
, vol.29
, Issue.3
, pp. 233-244
-
-
Tam, L.1
Glassman, M.2
Vandenwauver, M.3
-
49
-
-
84951910120
-
-
The robin sage experiment: fake profile fools security pros. at: [last accessed 14.07.13]
-
The robin sage experiment: fake profile fools security pros. Available at: http://www.networkworld.com/news/2010/070810-the-robin-sage-experiment-fake.html?t51hb [last accessed 14.07.13].
-
-
-
-
50
-
-
84951909971
-
-
Available at: [last accessed 01.12.13]
-
The Wall Street Journal Security tokens take hit 2011 Available at: http://online.wsj.com/news/articles/SB10001424052702304906004576369990616694366 [last accessed 01.12.13]
-
(2011)
Security Tokens Take Hit
-
-
Wall Street Journal, T.1
-
51
-
-
84873390405
-
The human element of information security
-
IEEE
-
H. Thompson The human element of information security Sec Priv 11 1 2013 32 35 IEEE
-
(2013)
Sec Priv
, vol.11
, Issue.1
, pp. 32-35
-
-
Thompson, H.1
-
52
-
-
84951909848
-
-
online at: [last accessed 03.12.13]
-
TrustedSec Social-engineer toolkit 2013 Available online at: https://www.trustedsec.com/downloads/social-engineer-toolkit/ [last accessed 03.12.13]
-
(2013)
Social-engineer Toolkit
-
-
Trustedsec1
-
53
-
-
84951909680
-
-
Whatsapp. online: [last accessed 18.07.13]
-
Whatsapp. Available online: http://www.whatsapp.com/ [last accessed 18.07.13].
-
-
-
-
54
-
-
84951909819
-
-
Online Available at: [last accessed 21.01.14]
-
Z. Whittaker Apple hacked by same group that attacked Facebook Online 2013 Available at: http://www.zdnet.com/apple-hacked-by-same-group-that-attacked-facebook-7000011509/ [last accessed 21.01.14]
-
(2013)
Apple Hacked by Same Group That Attacked Facebook
-
-
Whittaker, Z.1
|