Author:Mouton, Francois; Teixeira, M; Meyer, TDate:Nov 2017As the nature of information stored digitally be- comes more important and confidential, the security of the systems put in place to protect this information needs to be increased. The human element, however, remains a vulnerability of the ...Read more
Author:Labuschagne, WA; Veerasamy, NamoshaDate:Jul 2013The paper will illustrate the dangers of social networking malware through examples. In addition, the paper will discuss propagation techniques used in social networking malware. The aim of the paper is to create user awareness to minimise ...Read more
Author:Labuschagne, WA; Eloff, MM; Veerasamy, NamoshaDate:Sep 2012Social networking sites have increased in popularity and are utilized for many purposes which include connecting with other people, sharing information and creating content. Many people on social networking sites use these platforms to express ...Read more
Author:Mouton, F; Malan, MM; Venter, HSDate:Jun 2012Social engineering is a real threat to industries in this day and age, even though its severity is extremely downplayed. The difficulty with social engineering attacks is mostly the ability to identify them. Social engineers often target call ...Read more
Author:Mouton, F; Malan, MM; Kimppa, KK; Venter, HSDate:Nov 2015Social engineering is deeply entrenched in the fields of both computer science and social psychology. Knowledge is required in both these disciplines to perform social engineering based research. Several ethical concerns and requirements need ...Read more
Author:Mouton, Francois; Leenen, Louise; Venter, HSDate:Jun 2016The field of information security is a fast-growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to manipulation and thus the human element remains a ...Read more
Author:Labuschagne, WADate:Oct 2012As our dependence on information technology
increases, cyber attacks are becoming complex. The attack vector is growing and there are definite digital footprint dangers. Understanding of threat is critical; and security awareness is paramount ...Read more
Author:Mouton, Francois; Nottingham, Alastair T; Leenen, Louise; Venter, HSDate:Aug 2017Information security is a fast-growing discipline, and relies on continued improvement of security measures to protect sensitive information. In general, human operators are often highly susceptible to manipulation, and tend to be one of the ...Read more