Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.
1 Copyright © 2004 M. E. Kabay. All rights reserved. Phishing Information Systems Security Association New England Chapter Tuesday 16 Nov 2004 M. E. Kabay,
PhishZoo: Detecting Phishing Websites By Looking at Them Sadia Afroz Rachel Greenstadt.
Phishing
Spam (Security Awareness Session)
Secure Web Surfing and Hardening Windows Report
Phish market protocol
Geoff Huston's presentation on DANE (Keys in the DNS) at the New Zealand Internet Technical Architecture conference (InTAC)
COncept of Phishing
For ISA Server Real-time HTTP/FTP monitoring, anti-virus and access control.
© 2010 WatchGuard Technologies 21 September 2010, Glazen Huis - Utrecht Marco Weeber Regional Sales Manager.
DIR-835A1 Wireless N750 Dual-Band Router Wireless & Router Product Div. July 2011 D-Link WRPD.