SlideShare una empresa de Scribd logo
1 de 26
Phishing, Pharming,  and the latest potholes  on the Information Highway A Presentation by Ian Loe, CISSP
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malware ,[object Object],[object Object],[object Object],[object Object],[object Object]
Traditional Types of Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Latest Types of Malware
What is Spyware? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is   Adware? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How does Spyware work?   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spyware Concerns ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Getting Spyware is Easy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malicious Spyware   Types ,[object Object],[object Object],[object Object],[object Object],[object Object]
Malicious Spyware   Types  (cont…) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Phishing? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing Purpose ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bogus Websites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pharming Out-Scams Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Pharming? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pharming most alarming threat ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Challenges ,[object Object],[object Object],[object Object],[object Object]
Spyware Market Place ,[object Object],[object Object],[object Object]
Enterprise Solutions Emerging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Industry Approach - Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Industry Approach - Pharming   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions?
Thank You!

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Firewall
FirewallFirewall
Firewall
 
Security threats
Security threatsSecurity threats
Security threats
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server Security
 
Web security
Web securityWeb security
Web security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
internet security
internet securityinternet security
internet security
 
Web security
Web securityWeb security
Web security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Destacado

Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
Email of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsEmail of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsCalyptix Security
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attackKarthik
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 

Destacado (9)

Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Email of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsEmail of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clients
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 

Similar a Phishing, Pharming, and the latest potholes on the Information Highway

Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdfDIU
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert TrendSC Leung
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital SecurityRichard Homa
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Malware used in cybercrime
Malware used in cybercrimeMalware used in cybercrime
Malware used in cybercrimeRahul Sharma
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101Travis Good
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfssusera0b94b
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataamiyadutta
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breachesAjay Jassi
 

Similar a Phishing, Pharming, and the latest potholes on the Information Highway (20)

Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdf
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Computer security
Computer securityComputer security
Computer security
 
What is malware
What is malwareWhat is malware
What is malware
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert Trend
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Malware used in cybercrime
Malware used in cybercrimeMalware used in cybercrime
Malware used in cybercrime
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 

Más de Kevin Lim

Game Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer ExperienceGame Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer ExperienceKevin Lim
 
Social Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortalitySocial Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortalityKevin Lim
 
Productive Games
Productive GamesProductive Games
Productive GamesKevin Lim
 
The Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousnessThe Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousnessKevin Lim
 
Productive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human BehaviorProductive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human BehaviorKevin Lim
 
PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"Kevin Lim
 
PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"Kevin Lim
 
The Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your CauseThe Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your CauseKevin Lim
 
Leveling Up Students with Blogs
Leveling Up Students with BlogsLeveling Up Students with Blogs
Leveling Up Students with BlogsKevin Lim
 
Art of Listening 2.0
Art of Listening 2.0Art of Listening 2.0
Art of Listening 2.0Kevin Lim
 
Hyper Connected Beings
Hyper Connected BeingsHyper Connected Beings
Hyper Connected BeingsKevin Lim
 
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)Kevin Lim
 
COM125 Blog & Music Idol Awards
COM125 Blog & Music Idol AwardsCOM125 Blog & Music Idol Awards
COM125 Blog & Music Idol AwardsKevin Lim
 
I Heart Wikipedia
I Heart WikipediaI Heart Wikipedia
I Heart WikipediaKevin Lim
 
Facebook Strategies For The Classroom
Facebook Strategies For The ClassroomFacebook Strategies For The Classroom
Facebook Strategies For The ClassroomKevin Lim
 
Seduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participationSeduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participationKevin Lim
 
The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)Kevin Lim
 
If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.Kevin Lim
 

Más de Kevin Lim (18)

Game Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer ExperienceGame Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer Experience
 
Social Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortalitySocial Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortality
 
Productive Games
Productive GamesProductive Games
Productive Games
 
The Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousnessThe Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousness
 
Productive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human BehaviorProductive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human Behavior
 
PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"
 
PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"
 
The Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your CauseThe Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your Cause
 
Leveling Up Students with Blogs
Leveling Up Students with BlogsLeveling Up Students with Blogs
Leveling Up Students with Blogs
 
Art of Listening 2.0
Art of Listening 2.0Art of Listening 2.0
Art of Listening 2.0
 
Hyper Connected Beings
Hyper Connected BeingsHyper Connected Beings
Hyper Connected Beings
 
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
 
COM125 Blog & Music Idol Awards
COM125 Blog & Music Idol AwardsCOM125 Blog & Music Idol Awards
COM125 Blog & Music Idol Awards
 
I Heart Wikipedia
I Heart WikipediaI Heart Wikipedia
I Heart Wikipedia
 
Facebook Strategies For The Classroom
Facebook Strategies For The ClassroomFacebook Strategies For The Classroom
Facebook Strategies For The Classroom
 
Seduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participationSeduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participation
 
The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)
 
If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.
 

Último

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Phishing, Pharming, and the latest potholes on the Information Highway

  • 1. Phishing, Pharming, and the latest potholes on the Information Highway A Presentation by Ian Loe, CISSP
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.