SlideShare uma empresa Scribd logo
1 de 26
Phishing, Pharming,  and the latest potholes  on the Information Highway A Presentation by Ian Loe, CISSP
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malware ,[object Object],[object Object],[object Object],[object Object],[object Object]
Traditional Types of Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Latest Types of Malware
What is Spyware? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is   Adware? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How does Spyware work?   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spyware Concerns ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Getting Spyware is Easy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malicious Spyware   Types ,[object Object],[object Object],[object Object],[object Object],[object Object]
Malicious Spyware   Types  (cont…) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Phishing? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing Purpose ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bogus Websites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pharming Out-Scams Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Pharming? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pharming most alarming threat ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Challenges ,[object Object],[object Object],[object Object],[object Object]
Spyware Market Place ,[object Object],[object Object],[object Object]
Enterprise Solutions Emerging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Industry Approach - Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Industry Approach - Pharming   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions?
Thank You!

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Firewall
FirewallFirewall
Firewall
 
Security threats
Security threatsSecurity threats
Security threats
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server Security
 
Web security
Web securityWeb security
Web security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
internet security
internet securityinternet security
internet security
 
Web security
Web securityWeb security
Web security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Destaque

Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
Email of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsEmail of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsCalyptix Security
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attackKarthik
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 

Destaque (9)

Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Email of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsEmail of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clients
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 

Semelhante a Phishing, Pharming, and the latest potholes on the Information Highway

Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdfDIU
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert TrendSC Leung
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital SecurityRichard Homa
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
Malware used in cybercrime
Malware used in cybercrimeMalware used in cybercrime
Malware used in cybercrimeRahul Sharma
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101Travis Good
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfssusera0b94b
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataamiyadutta
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 

Semelhante a Phishing, Pharming, and the latest potholes on the Information Highway (20)

Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdf
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Computer security
Computer securityComputer security
Computer security
 
What is malware
What is malwareWhat is malware
What is malware
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert Trend
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Malware used in cybercrime
Malware used in cybercrimeMalware used in cybercrime
Malware used in cybercrime
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 

Mais de Kevin Lim

Game Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer ExperienceGame Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer ExperienceKevin Lim
 
Social Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortalitySocial Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortalityKevin Lim
 
Productive Games
Productive GamesProductive Games
Productive GamesKevin Lim
 
The Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousnessThe Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousnessKevin Lim
 
Productive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human BehaviorProductive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human BehaviorKevin Lim
 
PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"Kevin Lim
 
PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"Kevin Lim
 
The Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your CauseThe Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your CauseKevin Lim
 
Leveling Up Students with Blogs
Leveling Up Students with BlogsLeveling Up Students with Blogs
Leveling Up Students with BlogsKevin Lim
 
Art of Listening 2.0
Art of Listening 2.0Art of Listening 2.0
Art of Listening 2.0Kevin Lim
 
Hyper Connected Beings
Hyper Connected BeingsHyper Connected Beings
Hyper Connected BeingsKevin Lim
 
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)Kevin Lim
 
COM125 Blog & Music Idol Awards
COM125 Blog & Music Idol AwardsCOM125 Blog & Music Idol Awards
COM125 Blog & Music Idol AwardsKevin Lim
 
I Heart Wikipedia
I Heart WikipediaI Heart Wikipedia
I Heart WikipediaKevin Lim
 
Facebook Strategies For The Classroom
Facebook Strategies For The ClassroomFacebook Strategies For The Classroom
Facebook Strategies For The ClassroomKevin Lim
 
Seduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participationSeduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participationKevin Lim
 
The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)Kevin Lim
 
If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.Kevin Lim
 

Mais de Kevin Lim (18)

Game Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer ExperienceGame Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer Experience
 
Social Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortalitySocial Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortality
 
Productive Games
Productive GamesProductive Games
Productive Games
 
The Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousnessThe Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousness
 
Productive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human BehaviorProductive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human Behavior
 
PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"
 
PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"
 
The Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your CauseThe Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your Cause
 
Leveling Up Students with Blogs
Leveling Up Students with BlogsLeveling Up Students with Blogs
Leveling Up Students with Blogs
 
Art of Listening 2.0
Art of Listening 2.0Art of Listening 2.0
Art of Listening 2.0
 
Hyper Connected Beings
Hyper Connected BeingsHyper Connected Beings
Hyper Connected Beings
 
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
 
COM125 Blog & Music Idol Awards
COM125 Blog & Music Idol AwardsCOM125 Blog & Music Idol Awards
COM125 Blog & Music Idol Awards
 
I Heart Wikipedia
I Heart WikipediaI Heart Wikipedia
I Heart Wikipedia
 
Facebook Strategies For The Classroom
Facebook Strategies For The ClassroomFacebook Strategies For The Classroom
Facebook Strategies For The Classroom
 
Seduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participationSeduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participation
 
The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)
 
If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.
 

Último

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Último (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Phishing, Pharming, and the latest potholes on the Information Highway

  • 1. Phishing, Pharming, and the latest potholes on the Information Highway A Presentation by Ian Loe, CISSP
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.