BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks

In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods used to counteract the risks linked to BEC attacks f...

Full beskrivning

Bibliografiska uppgifter
Huvudupphovsmän: Anastasios Papathanasiou, George Liontos, Georgios Paparis, Vasiliki Liagkou, Euripides Glavas
Materialtyp: Artikel
Språk:English
Publicerad: MDPI AG 2024-03-01
Serie:Sensors
Ämnen:
Länkar:https://www.mdpi.com/1424-8220/24/5/1676