Главная
Study mode:
on
1
Introduction
2
What is phishing
3
Psychology of phishing
4
System 1 vs System 2
5
Attack vectors
6
Credentialbased phishing
7
Realworld examples
8
Domain protections
9
Phishing examples
10
Plain text vs HTML
11
Phishing pages
12
SMS 2FA
13
Phishing Training
14
Depressing Industry State
15
Whats the Point
16
Cryptographic Authentication
17
U2F
18
SSO
19
Limitations
20
Google Docs
21
Conclusion
Description:
Explore the science of phishing in this 28-minute conference talk by Karla Burnett at NorthSec. Delve into the psychology behind phishing attacks and examine real-world case studies from a Bay Area tech company. Learn about conversion rates for various attacks and discover how existing protections were circumvented. Gain insights into recent technological advancements in phishing prevention and acquire evidence-based techniques to prevent credential phishing, rather than just mitigating its effects. Cover topics such as the psychology of phishing, attack vectors, domain protections, SMS 2FA, phishing training effectiveness, cryptographic authentication, and limitations of current prevention methods. Equip yourself with valuable knowledge to enhance your organization's defense against sophisticated phishing attempts.

Ichthyology - Phishing as a Science

NorthSec
Add to list
0:00 / 0:00