Open Access
Subscription Access
Evaluation of Phishing Attack Strategies on Mobile Device Users
Phishing is one of the most common types of hostile internet attacks, which are on the rise on a daily basis. Phishing is a deliberate act that uses deception to trick unsuspecting individuals into disclosing their personal information online. Phishing attacks change in size and shape over time as they all have unique characteristics. Therefore, this paper attempts to evaluate phishing attack strategies on mobile device users by taking into account new techniques such as phishing attacks on videoconferencing services, SMS, voice calls, emails, and social media. The study also carried out a survey with the use of a questionnaire (via google form) to gather data from 122 mobile device users across Nigeria to elicit their awareness and experience, as well as responses to phishing attacks. The aim of this paper is to bring to light, phishing attacks techniques targeted at mobile device users, to sensitize the populace and provide information on how to avoid them.
Keywords
mobile devices, phishing, attacks
User
Font Size
Information
- Amro, B. (2017). Malware Detection Techniques for Mobile Devices. International Journal of Mobile Network Communication & Telematics, 7(4) 28 – 34
- Amro, B. (2018). Phishing techniques in mobile devices. Journal of Computer and Communications, 2018(6), 27-35
- APWG (2020). Phishing Activity trends Report 1st Quarter 2020 https://docs.apwg.org/reports/apwg_trends_report_q1_2020.pdf?_gl=1*1mx8oug*_ga*MTI1NTE5MTA5Ny4xNjU3MjY4NTE3*_ga_55RF0RHXSR*MTY1NzI2ODUxNi4xLjAuMTY1NzI2ODUxNi4w&_ga=2.204149143.605371871.1657268519-1255191097.1657268517 Retrieved 22 July 2020
- Bottazzi, G., Casalicchio, E., Cingolani, D., Marturana, F., & Piu, M. (2015, October). MP-shield: A framework for phishing detection in mobile devices. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (pp. 1977-1983). IEEE.
- CSO (2020). Five New Threats to Your Mobile Security. From https://www.csoonline.com/article/2157785/five-new-threats-to-your-mobile-security.html. Retrieved 26 July 2020
- Griffin, S. E., & Rackley, C. C. (2008, September). Vishing. In Proceedings of the 5th annual conference on Information security curriculum development (pp. 33-35).
- Srinivas, (2014). Broken cryptography. From https://resources.infosecinstitute.com/android-hacking-security-part-16-broken-cryptography/ Retrieved 26 October 2022.
- Joshi, R. (2015). "Interactive Phishing Filter". Unpublished Master's Projects. 430. From https://scholarworks.sjsu.edu/etd_projects/430 Retrieved 22 July 2020
- Kaspersky (2020) Top 7 Mobile Security Threats. From https://www.kaspersky.com/resource-center/threats/top-seven-mobile-security-threats-smart-phones-tablets-and-mobile-internet-devices-what-the-future-has-in-store Retrieved 23 July 2020
- Kemp, S. (2022). Digital 2022: Global Overview Report. From https://datareportal.com/reports/digital-2022-global-overview-report#:~:text=Global%20internet%20users%3A%20Global%20internet,of%20the%20world's%20total%20population. Retrieved 26 October 2022
- Lawrence, J. E., & Tar, U. A. (2010). Barriers to e-commerce in developing countries. Information, society and justice journal, 3(1), 23-35.
- Odeh, A., Keshta, I., & Abdelfattah, E. (2020). Efficient detection of phishing websites using multilayer perceptron. International Journal of Interactive Mobile Technologies, 14(11), 22-31
- Shahriar, H., Klintic, T., & Clincy, V. (2015). Mobile phishing attacks and mitigation techniques. Journal of Information Security, 6(03), 206 – 212.
- Whittaker, C., Ryner, B., & Nazif, M. (2010). Large-scale automatic classification of phishing pages. Available at https://storage.googleapis.com/pub-tools-public-publication-data/pdf/35580.pdf
- Yeboah-Boateng, E. O., & Amanor, P. M. (2014). Phishing, SMiShing & Vishing: an assessment of threats against mobile devices. Journal of Emerging Trends in Computing and Information Sciences, 5(4), 297-307.
- Yousif, H., Al-saedi, K. H., & Al-Hassani, M. D. (2019). Mobile Phishing Websites Detection and Prevention Using Data Mining Techniques. International Journal of Interactive Mobile Technologies, 13(10), 205 – 213.
Abstract Views: 83
PDF Views: 32