DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010

1. Jason Hong, PhD Carnegie Mellon University Wombat Security Technologies Teaching Johnny Not to Fall for Phish 2. Everyday Privacy and Security Problem 3. This entire process…

Technology Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011

1. Jason Hong, PhD Carnegie Mellon University Wombat Security Technologies Teaching Johnny Not to Fall for Phish 2. Everyday Privacy and Security Problem 3. This entire process…

Technology Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sept2011

1. Copyright © Wombat Security Technologies, Inc. 2008-2011 Jason Hong, PhD Assoc. Prof, Carnegie Mellon University CTO, Wombat Security Technologies Knowledgeable Users…

Technology Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phishing Education Landing....

1. CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu/1 CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu Statistical Analysis of Phished…

Documents CyLab Usable Privacy and Security Laboratory C yLab U sable P rivacy and S ecurity Laboratory ...

Slide 1 CyLab Usable Privacy and Security Laboratory http://cups.cs.cmu.edu/1 C yLab U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu Statistical Analysis…

Documents Jason Hong, PhD Carnegie Mellon University Wombat Security Technologies May 2010

Lessons from a Real World Evaluation of Anti-Phishing Training Statistical Analysis of Phished eMail Users, Intercepted by the APWG/CMU Phishing Education Landing Page Jason…