Shoaib Yousuf

"A Good Hacker Is A Well Known Hacker, A Great Hacker Is A Mystery..."

Tweets by shoaib_yousuf

Wednesday, October 6, 2010

Trends and Domain Name Use 2009

Global Phishing Survey released in May 2010

Interesting survey and worth reading it.
Global Phishing Survey - Trends and Domain Names used in 2009
Posted by Shoaib Yousuf at 3:12 PM
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: Compliance, Financial Crime, Online Banking, Phishing, Reports, Security Advice, Security Research, Security Scams, Security Trends

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

About Me

Unknown
View my complete profile

Follow me on Twitter

Follow @shoaib_yousuf

Blog Archive

  • ►  2016 (1)
    • ►  February (1)
  • ►  2015 (3)
    • ►  June (1)
    • ►  April (1)
    • ►  January (1)
  • ►  2014 (23)
    • ►  October (1)
    • ►  August (3)
    • ►  July (2)
    • ►  June (1)
    • ►  May (2)
    • ►  April (4)
    • ►  March (2)
    • ►  February (5)
    • ►  January (3)
  • ►  2013 (98)
    • ►  December (5)
    • ►  November (5)
    • ►  October (7)
    • ►  September (9)
    • ►  August (9)
    • ►  July (12)
    • ►  June (10)
    • ►  May (11)
    • ►  April (7)
    • ►  March (9)
    • ►  February (7)
    • ►  January (7)
  • ►  2012 (151)
    • ►  December (10)
    • ►  November (13)
    • ►  October (11)
    • ►  September (13)
    • ►  August (12)
    • ►  July (12)
    • ►  June (12)
    • ►  May (15)
    • ►  April (15)
    • ►  March (12)
    • ►  February (13)
    • ►  January (13)
  • ►  2011 (190)
    • ►  December (15)
    • ►  November (12)
    • ►  October (14)
    • ►  September (16)
    • ►  August (19)
    • ►  July (20)
    • ►  June (21)
    • ►  May (16)
    • ►  April (15)
    • ►  March (14)
    • ►  February (14)
    • ►  January (14)
  • ▼  2010 (139)
    • ►  November (9)
    • ▼  October (18)
      • Identity Theft: Trends, Patterns and Typologies Re...
      • How to bypass iPhone’s passcode-protected lock scr...
      • Verizon report connects PCI non-compliance and dat...
      • NIST Scientists Offer Tips to Defeat Keyloggers
      • Advanced evasion techniques can bypass network sec...
      • Problems associated with elevated privileges
      • Facebook improving its security or increasing user...
      • Microsoft Security Intelligence Report - Volume 9
      • Security of Infrastructure Control Systems for Wat...
      • Mobile platform can also be the next Advanced Pers...
      • 440 million new hackable smart grid points
      • Protect Yourself from Migration Fraud
      • A government-produced worm that may be aimed at an...
      • Smart grid security: Critical success factors
      • Trends and Domain Name Use 2009
      • Phishing has always been attractive to criminals
      • Maltego 3 - Quick and Effective Information Gather...
      • Securing our Confidential Information
    • ►  September (13)
    • ►  August (15)
    • ►  July (14)
    • ►  June (15)
    • ►  May (13)
    • ►  April (13)
    • ►  March (10)
    • ►  February (8)
    • ►  January (11)
  • ►  2009 (139)
    • ►  December (7)
    • ►  November (10)
    • ►  October (11)
    • ►  September (12)
    • ►  August (13)
    • ►  July (13)
    • ►  June (10)
    • ►  May (15)
    • ►  April (16)
    • ►  March (15)
    • ►  February (11)
    • ►  January (6)
  • ►  2008 (222)
    • ►  December (13)
    • ►  November (9)
    • ►  October (21)
    • ►  September (18)
    • ►  August (19)
    • ►  July (30)
    • ►  June (14)
    • ►  May (21)
    • ►  April (21)
    • ►  March (18)
    • ►  February (19)
    • ►  January (19)
  • ►  2007 (24)
    • ►  December (13)
    • ►  November (11)

Visitors from around the world

Locations of visitors to this page

Follow by Email

Subscribe To Blog

Posts
Atom
Posts
Comments
Atom
Comments
Awesome Inc. theme. Powered by Blogger.