SlideShare a Scribd company logo
1 of 24
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu/1
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu
Statistical Analysis of Phished
eMail Users, Intercepted by the
APWG/CMU Phishing Education
Landing Page
Jason Hong, PhD
Carnegie Mellon University
Wombat Security Technologies
May 2010
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 2
User Education is Challenging
 Users are not motivated to learn about security
 Security is a secondary task
 Difficult to teach people to make right online
trust decision without increasing false positives
“User education is a complete waste of time. It is
about as much use as nailing jelly to a wall….
They are not interested…they just want to do
their job.”
Martin Overton, IBM security specialist
http://news.cnet.com/21007350_361252132.html
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 3
But Actually, Users Are Trainable
 Our research demonstrates that users can learn
techniques to protect themselves from phishing…
if you can get them to pay attention to training
P. Kumaraguru, S. Sheng, A. Acquisti, L. Cranor, and J. Hong. Teaching Johnny
Not to Fall for Phish. CyLab Technical Report CMUCyLab07003, 2007.
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 4
How Do We Get People Trained?
 Solution
– Find “teachable moments”:
PhishGuru
– Make training fun:
AntiPhishing Phil,
AntiPhishing Phyllis
– Use learning science
principles
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 5
PhishGuru Embedded Training
 Send emails that look like a phishing attack
 If recipient falls for it, show intervention that
teaches what cues to look for in succinct and
engaging format
 Multiple user studies have demonstrated
that this is effective
 Delivering same training via direct email is
not effective!
Subject: Revision to Your Amazon.com Information
Subject: Revision to Your Amazon.com Information
Please login and enter your information
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 9
APWG Landing Page
 Taking the “teachable moment” concept
one step further
 Provide education (instead of 404) when users
click on real phishing links and arrive at real
phishing sites that have been taken down
P. Kumaraguru, L. Cranor, and L. Mather. AntiPhishing Landing Page:
Turning a 404 into a Teachable Moment for End Users. CEAS 2009.
http://www.ceas.cc/papers2009/ceas2009paper37.pdf
http://education.apwg.org/
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 10
How the Landing Page Works
 Brand owner or phish site takedown provider
identifies phish site
 ISP or registrar is asked to redirect disabled
phish site to APWG redirect page
 Consumer receives phishing email and clicks
 Consumer is shown APWG education message
instead of 404 page
– Page available in many languages
– Automatic redirect to appropriate language based
on browser language code to happen soon
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 11
APWG Landing Page
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 12
Landing Page Data Collection
 APWG server logs all requests to landing page
– Time stamp
– IP address (to determine country)
– Language (will redirect to page in user’s language)
 We’ve asked sites to embed info in redirect URL
to track how people end up on landing page
– Original URL taken down
– Brand code (optional)
 CMU CUPS Lab and Wombat Security
Technologies have been analyzing the data
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 13
Lots of noisy data!
 20 months of data (Sept 2008-April 2010)
 840K hits on 15,000 unique redirected URLs
 But this data contains lots of noise
– Brand monitors checking up on sites to make
sure they stay down
– Random web crawlers
– People testing landing page
– Incorrectly redirected sites
 We used heuristics to filter out most of the noise
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 14
Filtering Out the Noise
 We filtered the data set by removing:
– Hits that don’t identify the original phishing site (brand)
– Hits that seem to be for testing only
• URLs appearing only once
• IPs that hit multiple URLs per day
• IPs that hit same URL for more than a month
– Hits from bots (e.g., specific IPs, 'bot', 'plurk', etc)
– Hits from wonderdogsoftware (server misconfiguration
that linked to homepage)
 Filtering not perfect
– Some noise remains
– Improperly redirected sites don’t get counted
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 15
Filtered Data
 201,084 hits
– estimate of actual would-be phishing victims
visiting landing page over 20 month period
 1285 unique URLs redirected
– Note that this is URLs, not domains
 Number of hits per URL varies a lot
– URL with most hits after filtering had 17,911 hits
– Monthly mean hits per URL typically 100-300
– Monthly median hits per URL 2-7
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 16
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 17
Analysis of Time
 Monitoring time period of each observed URL may
give us insights into length of phishing campaigns
 Time observed for each URL is number of days
between first observation and last observation
 Limitations
– Our first observation is time when site was redirected; we
don’t know how long it was live before being redirected
– Some URLs are observed across month boundaries
– Once browsers start blocking URL we may not have hits
– Some redirects are removed after a period of time
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 18
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 19
April 2010
Top 20 countries hit landing page
 United States 11,159
 Canada 3,819
 United Kingdom 1,790
 Netherlands 725
 Germany 650
 Spain 600
 France 470
 Japan 452
 Australia 449
 India 417
 Singapore 292
 Mexico 238
 Egypt 212
 NA 184
 Russian Federation 184
 Austria 174
 Sweden 145
 China 137
 Brazil 126
 Norway 101
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 20
Analysis of Brands
 7 brands have requested brand codes
 Only 2 have shown up in logs
 April 2010 brand data
– Brand 1
• Total Hits: 2715
• Total unique URLs: 52
– Brand 2
• Total Hits: 370
• Total unique URLs: 3
 We supplied each brand with a report showing
list of their URLs and number of hits for each
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 21
Ongoing Work
 Will soon be posting monthly reports at
http://education.apwg.org/
 Redirecting landing page automatically
to show correct language (soon)
 Encouraging more brands to redirect to
landing page
– If you sign up for a brand code we can provide
you with monthly brand reports
– laura.mather@antiphishing.org
 Continuing to automate log processing,
report generation, report distribution
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 22
For more information
 Learn how to participate in the initiative:
http://education.apwg.org/
 View the landing page:
http://education.apwg.org/r/en/
http://wombatsecurity.com
CyLab Usable Privacy
and Security Laboratory
http://cups.cs.cmu.edu/
CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 24
Other countries that sometimes
make top 20
 Italy
 Romania
 Czech Republic
 Finland
 Ireland
 India
 EU
 Turkey
 Belgium
 Switzerland
 Colombia
 Israel
 Morocco
 Saudi Arabia
 Argentina
 Indonesia
 Thailand
 Tunisia
 Poland
 Greece
 Korea
 Chile
 Pakistan

More Related Content

Similar to Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phishing Education Landing Page, at APWG CeCOS 2010

Similar to Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phishing Education Landing Page, at APWG CeCOS 2010 (20)

Data Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus PandemicData Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus Pandemic
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
What is security testing and why it is so important?
What is security testing and why it is so important?What is security testing and why it is so important?
What is security testing and why it is so important?
 
Phishing Detection using Decision Tree Model
Phishing Detection using Decision Tree ModelPhishing Detection using Decision Tree Model
Phishing Detection using Decision Tree Model
 
SplunkLive! Paris 2018: Intro to Security Analytics Methods
SplunkLive! Paris 2018: Intro to Security Analytics MethodsSplunkLive! Paris 2018: Intro to Security Analytics Methods
SplunkLive! Paris 2018: Intro to Security Analytics Methods
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection System
 
Getting Started with Sitelock on ResellerClub
Getting Started with Sitelock on ResellerClubGetting Started with Sitelock on ResellerClub
Getting Started with Sitelock on ResellerClub
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
 
Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 
INTRODUCTION TO INFORMATION RETRIVAL
INTRODUCTION TO INFORMATION RETRIVALINTRODUCTION TO INFORMATION RETRIVAL
INTRODUCTION TO INFORMATION RETRIVAL
 
IRJET- Search Engine Optimization (Seo)
IRJET-  	  Search Engine Optimization (Seo)IRJET-  	  Search Engine Optimization (Seo)
IRJET- Search Engine Optimization (Seo)
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
Labelling – are you serious
Labelling – are you seriousLabelling – are you serious
Labelling – are you serious
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
How to Incorporate a Security-First Approach to Your Products by spiderSlik C...
How to Incorporate a Security-First Approach to Your Products by spiderSlik C...How to Incorporate a Security-First Approach to Your Products by spiderSlik C...
How to Incorporate a Security-First Approach to Your Products by spiderSlik C...
 
Best practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 programBest practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 program
 
Internet research for HRD Profession
Internet research for HRD ProfessionInternet research for HRD Profession
Internet research for HRD Profession
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phishing Education Landing Page, at APWG CeCOS 2010

  • 1. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu/1 CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu Statistical Analysis of Phished eMail Users, Intercepted by the APWG/CMU Phishing Education Landing Page Jason Hong, PhD Carnegie Mellon University Wombat Security Technologies May 2010
  • 2. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 2 User Education is Challenging  Users are not motivated to learn about security  Security is a secondary task  Difficult to teach people to make right online trust decision without increasing false positives “User education is a complete waste of time. It is about as much use as nailing jelly to a wall…. They are not interested…they just want to do their job.” Martin Overton, IBM security specialist http://news.cnet.com/21007350_361252132.html
  • 3. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 3 But Actually, Users Are Trainable  Our research demonstrates that users can learn techniques to protect themselves from phishing… if you can get them to pay attention to training P. Kumaraguru, S. Sheng, A. Acquisti, L. Cranor, and J. Hong. Teaching Johnny Not to Fall for Phish. CyLab Technical Report CMUCyLab07003, 2007.
  • 4. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 4 How Do We Get People Trained?  Solution – Find “teachable moments”: PhishGuru – Make training fun: AntiPhishing Phil, AntiPhishing Phyllis – Use learning science principles
  • 5. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 5 PhishGuru Embedded Training  Send emails that look like a phishing attack  If recipient falls for it, show intervention that teaches what cues to look for in succinct and engaging format  Multiple user studies have demonstrated that this is effective  Delivering same training via direct email is not effective!
  • 6. Subject: Revision to Your Amazon.com Information
  • 7. Subject: Revision to Your Amazon.com Information Please login and enter your information
  • 8.
  • 9. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 9 APWG Landing Page  Taking the “teachable moment” concept one step further  Provide education (instead of 404) when users click on real phishing links and arrive at real phishing sites that have been taken down P. Kumaraguru, L. Cranor, and L. Mather. AntiPhishing Landing Page: Turning a 404 into a Teachable Moment for End Users. CEAS 2009. http://www.ceas.cc/papers2009/ceas2009paper37.pdf http://education.apwg.org/
  • 10. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 10 How the Landing Page Works  Brand owner or phish site takedown provider identifies phish site  ISP or registrar is asked to redirect disabled phish site to APWG redirect page  Consumer receives phishing email and clicks  Consumer is shown APWG education message instead of 404 page – Page available in many languages – Automatic redirect to appropriate language based on browser language code to happen soon
  • 11. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 11 APWG Landing Page
  • 12. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 12 Landing Page Data Collection  APWG server logs all requests to landing page – Time stamp – IP address (to determine country) – Language (will redirect to page in user’s language)  We’ve asked sites to embed info in redirect URL to track how people end up on landing page – Original URL taken down – Brand code (optional)  CMU CUPS Lab and Wombat Security Technologies have been analyzing the data
  • 13. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 13 Lots of noisy data!  20 months of data (Sept 2008-April 2010)  840K hits on 15,000 unique redirected URLs  But this data contains lots of noise – Brand monitors checking up on sites to make sure they stay down – Random web crawlers – People testing landing page – Incorrectly redirected sites  We used heuristics to filter out most of the noise
  • 14. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 14 Filtering Out the Noise  We filtered the data set by removing: – Hits that don’t identify the original phishing site (brand) – Hits that seem to be for testing only • URLs appearing only once • IPs that hit multiple URLs per day • IPs that hit same URL for more than a month – Hits from bots (e.g., specific IPs, 'bot', 'plurk', etc) – Hits from wonderdogsoftware (server misconfiguration that linked to homepage)  Filtering not perfect – Some noise remains – Improperly redirected sites don’t get counted
  • 15. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 15 Filtered Data  201,084 hits – estimate of actual would-be phishing victims visiting landing page over 20 month period  1285 unique URLs redirected – Note that this is URLs, not domains  Number of hits per URL varies a lot – URL with most hits after filtering had 17,911 hits – Monthly mean hits per URL typically 100-300 – Monthly median hits per URL 2-7
  • 16. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 16
  • 17. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 17 Analysis of Time  Monitoring time period of each observed URL may give us insights into length of phishing campaigns  Time observed for each URL is number of days between first observation and last observation  Limitations – Our first observation is time when site was redirected; we don’t know how long it was live before being redirected – Some URLs are observed across month boundaries – Once browsers start blocking URL we may not have hits – Some redirects are removed after a period of time
  • 18. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 18
  • 19. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 19 April 2010 Top 20 countries hit landing page  United States 11,159  Canada 3,819  United Kingdom 1,790  Netherlands 725  Germany 650  Spain 600  France 470  Japan 452  Australia 449  India 417  Singapore 292  Mexico 238  Egypt 212  NA 184  Russian Federation 184  Austria 174  Sweden 145  China 137  Brazil 126  Norway 101
  • 20. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 20 Analysis of Brands  7 brands have requested brand codes  Only 2 have shown up in logs  April 2010 brand data – Brand 1 • Total Hits: 2715 • Total unique URLs: 52 – Brand 2 • Total Hits: 370 • Total unique URLs: 3  We supplied each brand with a report showing list of their URLs and number of hits for each
  • 21. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 21 Ongoing Work  Will soon be posting monthly reports at http://education.apwg.org/  Redirecting landing page automatically to show correct language (soon)  Encouraging more brands to redirect to landing page – If you sign up for a brand code we can provide you with monthly brand reports – laura.mather@antiphishing.org  Continuing to automate log processing, report generation, report distribution
  • 22. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 22 For more information  Learn how to participate in the initiative: http://education.apwg.org/  View the landing page: http://education.apwg.org/r/en/
  • 23. http://wombatsecurity.com CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu/
  • 24. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu 24 Other countries that sometimes make top 20  Italy  Romania  Czech Republic  Finland  Ireland  India  EU  Turkey  Belgium  Switzerland  Colombia  Israel  Morocco  Saudi Arabia  Argentina  Indonesia  Thailand  Tunisia  Poland  Greece  Korea  Chile  Pakistan