380 likes | 403 Views
Explore the intricate world of phishing and discover the latest countermeasures and strategies to protect your information. Learn about user education, image recognition, secure patching, and more in this comprehensive guide.
E N D
Anti-Phishing Technology Chokepoints and Countermeasures Aaron EmighRadix Labsaaron@radixlabs.com
Image Recognition Simple idea: recognize logos
Image Recognition Maybe not so simple…
Image Recognition Fully render, then retrieve sub-images
Education Why Johnny can’t identify phish…
Unmask Deceptive Links <P>To go to a surprising place via a cloaked URL, click on <A HREF="http://security.ebay.com@phisher.com">this link.</A> <P>To go to a surprising place via a cloaked URL with a password, click on <A HREF="http://security.ebay.com:password@phisher.com">this link.</A> <P>To go to a surprising place via an open redirect, click on <A HREF="http://redirect.ebaysecurity.com?url=phisher.com">this link.</A> <P>To go to a surprising place via misleading link, click on <A HREF="http://phisher.com">http://security.ebay.com.</A>
Unmask Deceptive Links <P>To go to a surprising place via a cloaked URL, click on <A HREF="http://security.ebay.com@phisher.com">this link.</A> <P>To go to a surprising place via a cloaked URL with a password, click on <A HREF="http://security.ebay.com:password@phisher.com">this link.</A> <P>To go to a surprising place via an open redirect, click on <A HREF="http://redirect.ebaysecurity.com?url=phisher.com">this link.</A> <P>To go to a surprising place via misleading link, click on <A HREF="http://phisher.com">http://security.ebay.com.</A>
Secure Path (That Was Then) Login: aaron Password: ******
Anti-Phishing Technology Chokepoints and Countermeasures Aaron EmighRadix Labsaaron@radixlabs.com