Website Hosting Courtesy GeoTrust

IMPORTANT NOTE: Each Event Requires a Separate Registration. Link Through for More Details
|
|
|
Phishing attacks use both social engineering and technical subterfuge to steal consumers'
personal identity data and financial account credentials. Social-engineering schemes use 'spoofed' e-mails
to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as
credit card numbers, account usernames, passwords and social security numbers. Hijacking brand names of banks,
e-retailers and credit card companies, phishers often convince recipients to respond. Technical subterfuge schemes
plant crimeware onto PCs to steal credentials directly, often using Trojan keylogger spyware. Pharming
crimeware misdirects users to fraudulent sites or proxy servers, typically through DNS hijacking or poisoning.
|
|

Growth slows in August - but not significantly

Another upward bounce after last months drop
Graphics courtesy Websense, Inc.
|
 |
|
|
|
|
- 12-Oct-06: ITU/MII meeting in Zhengzhou, China
Peter Cassidy, APWG Secretary-General, addresses the International Telecommunications Union and the Ministry of Information Industry in Zhengzhou, China.
- 10-Oct-06: FIRST Technical Colloquium, Brazil
Pat Cain, APWG Resident Research Fellow, addresses the 2006 FIRST Technical Colloquium in Rio de Janeiro, BR
- 09-Oct-06: August Phishing Trends Report Available
August Phishing Activity Trends Report
- 26-Sept-06: FSTC General Meeting
The FSTC General Meeting is scheduled for Oct. 10-12 at Columbia University
- 11-Sept-06: July Phishing Trends Report Available
July Phishing Activity Trends Report
-
06-Sept-06: Registration opens for Fall 2006 Super-Summit
Registration opens for the Fall Super-Summit in Orlando, Fl. The weeks comdined events include the Fall 2006 General Meeting and the 2006 eCrime Reseachers Summit.
-
25-Aug-06: June Phishing Trends Report Available
June Phishing Activity Trends Report
-
25-Jul-06: APWG & MAAWG release joint Best Practices document
The APWG and the MAAWG release a joint paper on best practices for ISPs and Mail Box providers.
View the document here.
-
18-Jul-06: FDIC Releases New Rules on ID Theft
Rules Proposed on Identity Theft Red Flags and Notices of Address Discrepancy
-
06-Jul-06: Korea Phishing Activity Trends Report
June 2006
Korea Internet Security Center
Korea Phishing Activity Trends Report
-
15-Jun-06: May Phishing Trends Report Available
May Phishing Activity Trends Report
-
22-May-06: April Phishing Trends Report Available
April Phishing Activity Trends Report
-
11-May-06: FTC unveils ID theft education campaign
Federal Trade Commission launches "Avoid ID Theft: Deter, Detect, Defend", a campaign to advise consumers on techniques to neutralize identity theft.
The free kit is available here: http://www.consumer.gov/idtheft/
-
03-May-06: New CyberCrime Blog Site available
Dipping Through Geometries
Jonathan Rusch, longtime APWG Member and defender of good has a new blog site. The APWG places high merit on Jonathan's insight and experience. We wish him well on this new endeavor.
17-Mar-06: Korea Phishing Activity Trends Report
February 2006
Korea Internet Security Center
Korea Phishing Activity Trends Report
- 16-Dec-05 - APWG and Websense Present the Phishing and Crimeware Map

- 08-Nov-05 - APWG Announces DHS Counter-Phishing Strategies
Whitepaper: Online
Identity Theft: Technology, Chokepoints and Countermeasures
Check out the advice we've compiled for consumers on phishing:
If you are willing to talk about your experience to help educate and warn others, please let us know at info@antiphishing.org.
|
|
|
|
|
|
|
|