Shoaib Yousuf

"A Good Hacker Is A Well Known Hacker, A Great Hacker Is A Mystery..."

Tweets by shoaib_yousuf

Wednesday, October 6, 2010

Trends and Domain Name Use 2009

Global Phishing Survey released in May 2010

Interesting survey and worth reading it.
Global Phishing Survey - Trends and Domain Names used in 2009
Posted by Shoaib Yousuf at 3:12 PM
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: Compliance, Financial Crime, Online Banking, Phishing, Reports, Security Advice, Security Research, Security Scams, Security Trends

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

About Me

Unknown
View my complete profile

Follow me on Twitter

Follow @shoaib_yousuf

Blog Archive

  • ►  2016 (1)
    • ►  February (1)
  • ►  2015 (3)
    • ►  June (1)
    • ►  April (1)
    • ►  January (1)
  • ►  2014 (23)
    • ►  October (1)
    • ►  August (3)
    • ►  July (2)
    • ►  June (1)
    • ►  May (2)
    • ►  April (4)
    • ►  March (2)
    • ►  February (5)
    • ►  January (3)
  • ►  2013 (98)
    • ►  December (5)
    • ►  November (5)
    • ►  October (7)
    • ►  September (9)
    • ►  August (9)
    • ►  July (12)
    • ►  June (10)
    • ►  May (11)
    • ►  April (7)
    • ►  March (9)
    • ►  February (7)
    • ►  January (7)
  • ►  2012 (151)
    • ►  December (10)
    • ►  November (13)
    • ►  October (11)
    • ►  September (13)
    • ►  August (12)
    • ►  July (12)
    • ►  June (12)
    • ►  May (15)
    • ►  April (15)
    • ►  March (12)
    • ►  February (13)
    • ►  January (13)
  • ►  2011 (190)
    • ►  December (15)
    • ►  November (12)
    • ►  October (14)
    • ►  September (16)
    • ►  August (19)
    • ►  July (20)
    • ►  June (21)
    • ►  May (16)
    • ►  April (15)
    • ►  March (14)
    • ►  February (14)
    • ►  January (14)
  • ▼  2010 (139)
    • ►  November (9)
    • ▼  October (18)
      • Identity Theft: Trends, Patterns and Typologies Re...
      • How to bypass iPhone’s passcode-protected lock scr...
      • Verizon report connects PCI non-compliance and dat...
      • NIST Scientists Offer Tips to Defeat Keyloggers
      • Advanced evasion techniques can bypass network sec...
      • Problems associated with elevated privileges
      • Facebook improving its security or increasing user...
      • Microsoft Security Intelligence Report - Volume 9
      • Security of Infrastructure Control Systems for Wat...
      • Mobile platform can also be the next Advanced Pers...
      • 440 million new hackable smart grid points
      • Protect Yourself from Migration Fraud
      • A government-produced worm that may be aimed at an...
      • Smart grid security: Critical success factors
      • Trends and Domain Name Use 2009
      • Phishing has always been attractive to criminals
      • Maltego 3 - Quick and Effective Information Gather...
      • Securing our Confidential Information
    • ►  September (13)
    • ►  August (15)
    • ►  July (14)
    • ►  June (15)
    • ►  May (13)
    • ►  April (13)
    • ►  March (10)
    • ►  February (8)
    • ►  January (11)
  • ►  2009 (139)
    • ►  December (7)
    • ►  November (10)
    • ►  October (11)
    • ►  September (12)
    • ►  August (13)
    • ►  July (13)
    • ►  June (10)
    • ►  May (15)
    • ►  April (16)
    • ►  March (15)
    • ►  February (11)
    • ►  January (6)
  • ►  2008 (222)
    • ►  December (13)
    • ►  November (9)
    • ►  October (21)
    • ►  September (18)
    • ►  August (19)
    • ►  July (30)
    • ►  June (14)
    • ►  May (21)
    • ►  April (21)
    • ►  March (18)
    • ►  February (19)
    • ►  January (19)
  • ►  2007 (24)
    • ►  December (13)
    • ►  November (11)

Visitors from around the world

Locations of visitors to this page

Subscribe To Blog

Posts
Atom
Posts
Comments
Atom
Comments
Awesome Inc. theme. Powered by Blogger.