
doi: 10.2139/ssrn.2905041
Over the last ten years, spear phishing was used mainly by espionage groups sponsored by different world states to delude high-ranking people by deceiving them to disclose specific information precious to the attackers. But recently, their strategy has changed and specialists wondered why they troubled to “spread crypto ransomware or banking trojans to the masses when a single scam e-mail could do the trick?” (Godin, 2016) This article investigates the answers to this question, the main ingredients that turn a cyber attack into a successful spear phishing and some protective ways against this sweeping wave of cybercrimes.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 3 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
