SlideShare a Scribd company logo
1 of 26
Phishing, Pharming,  and the latest potholes  on the Information Highway A Presentation by Ian Loe, CISSP
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malware ,[object Object],[object Object],[object Object],[object Object],[object Object]
Traditional Types of Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Latest Types of Malware
What is Spyware? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is   Adware? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How does Spyware work?   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spyware Concerns ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Getting Spyware is Easy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malicious Spyware   Types ,[object Object],[object Object],[object Object],[object Object],[object Object]
Malicious Spyware   Types  (cont…) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Phishing? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing Purpose ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bogus Websites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pharming Out-Scams Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Pharming? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pharming most alarming threat ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Challenges ,[object Object],[object Object],[object Object],[object Object]
Spyware Market Place ,[object Object],[object Object],[object Object]
Enterprise Solutions Emerging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Industry Approach - Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Industry Approach - Pharming   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions?
Thank You!

More Related Content

What's hot

What's hot (20)

Firewall
FirewallFirewall
Firewall
 
Security threats
Security threatsSecurity threats
Security threats
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server Security
 
Web security
Web securityWeb security
Web security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
internet security
internet securityinternet security
internet security
 
Web security
Web securityWeb security
Web security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Viewers also liked

Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
Email of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsEmail of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsCalyptix Security
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attackKarthik
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 

Viewers also liked (9)

Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Email of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsEmail of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clients
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 

Similar to Phishing, Pharming, and the latest potholes on the Information Highway

Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdfDIU
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert TrendSC Leung
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital SecurityRichard Homa
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
Malware used in cybercrime
Malware used in cybercrimeMalware used in cybercrime
Malware used in cybercrimeRahul Sharma
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101Travis Good
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfssusera0b94b
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataamiyadutta
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 

Similar to Phishing, Pharming, and the latest potholes on the Information Highway (20)

Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdf
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Computer security
Computer securityComputer security
Computer security
 
What is malware
What is malwareWhat is malware
What is malware
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert Trend
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Malware used in cybercrime
Malware used in cybercrimeMalware used in cybercrime
Malware used in cybercrime
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 

More from Kevin Lim

Game Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer ExperienceGame Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer ExperienceKevin Lim
 
Social Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortalitySocial Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortalityKevin Lim
 
Productive Games
Productive GamesProductive Games
Productive GamesKevin Lim
 
The Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousnessThe Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousnessKevin Lim
 
Productive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human BehaviorProductive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human BehaviorKevin Lim
 
PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"Kevin Lim
 
PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"Kevin Lim
 
The Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your CauseThe Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your CauseKevin Lim
 
Leveling Up Students with Blogs
Leveling Up Students with BlogsLeveling Up Students with Blogs
Leveling Up Students with BlogsKevin Lim
 
Art of Listening 2.0
Art of Listening 2.0Art of Listening 2.0
Art of Listening 2.0Kevin Lim
 
Hyper Connected Beings
Hyper Connected BeingsHyper Connected Beings
Hyper Connected BeingsKevin Lim
 
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)Kevin Lim
 
COM125 Blog & Music Idol Awards
COM125 Blog & Music Idol AwardsCOM125 Blog & Music Idol Awards
COM125 Blog & Music Idol AwardsKevin Lim
 
I Heart Wikipedia
I Heart WikipediaI Heart Wikipedia
I Heart WikipediaKevin Lim
 
Facebook Strategies For The Classroom
Facebook Strategies For The ClassroomFacebook Strategies For The Classroom
Facebook Strategies For The ClassroomKevin Lim
 
Seduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participationSeduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participationKevin Lim
 
The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)Kevin Lim
 
If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.Kevin Lim
 

More from Kevin Lim (18)

Game Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer ExperienceGame Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer Experience
 
Social Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortalitySocial Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortality
 
Productive Games
Productive GamesProductive Games
Productive Games
 
The Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousnessThe Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousness
 
Productive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human BehaviorProductive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human Behavior
 
PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"
 
PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"
 
The Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your CauseThe Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your Cause
 
Leveling Up Students with Blogs
Leveling Up Students with BlogsLeveling Up Students with Blogs
Leveling Up Students with Blogs
 
Art of Listening 2.0
Art of Listening 2.0Art of Listening 2.0
Art of Listening 2.0
 
Hyper Connected Beings
Hyper Connected BeingsHyper Connected Beings
Hyper Connected Beings
 
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
 
COM125 Blog & Music Idol Awards
COM125 Blog & Music Idol AwardsCOM125 Blog & Music Idol Awards
COM125 Blog & Music Idol Awards
 
I Heart Wikipedia
I Heart WikipediaI Heart Wikipedia
I Heart Wikipedia
 
Facebook Strategies For The Classroom
Facebook Strategies For The ClassroomFacebook Strategies For The Classroom
Facebook Strategies For The Classroom
 
Seduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participationSeduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participation
 
The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)
 
If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Phishing, Pharming, and the latest potholes on the Information Highway

  • 1. Phishing, Pharming, and the latest potholes on the Information Highway A Presentation by Ian Loe, CISSP
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.