<div dir="ltr"><span style="color:rgb(51,51,51);font-family:monospace;font-size:12px;white-space:nowrap">Thank you Dr. Maureen Hilyard for the post in the trace.</span><br style="color:rgb(51,51,51);font-family:monospace;font-size:12px"><br style="color:rgb(51,51,51);font-family:monospace;font-size:12px"><span style="color:rgb(51,51,51);font-family:monospace;font-size:12px;white-space:nowrap">It may be useful to study this report in conjunction with "my choice"</span><br style="color:rgb(51,51,51);font-family:monospace;font-size:12px"><span style="color:rgb(51,51,51);font-family:monospace;font-size:12px;white-space:nowrap">paper titled:</span><br style="color:rgb(51,51,51);font-family:monospace;font-size:12px"><br style="color:rgb(51,51,51);font-family:monospace;font-size:12px"><span style="color:rgb(51,51,51);font-family:monospace;font-size:12px;white-space:nowrap">The Psychology of Internet Fraud Victimisation: a Systematic Review</span><br style="color:rgb(51,51,51);font-family:monospace;font-size:12px"><span style="color:rgb(51,51,51);font-family:monospace;font-size:12px;white-space:nowrap">Journal of Police and Criminal Psychology Vol. 34, Pp 231–245, 2019</span><br style="color:rgb(51,51,51);font-family:monospace;font-size:12px"><span style="color:rgb(51,51,51);font-family:monospace;font-size:12px;white-space:nowrap"><a rel="noreferrer" target="_blank" href="https://d-nb.info/1202645739/34" style="color:rgb(0,105,166)">https://d-nb.info/1202645739/34</a></span><br style="color:rgb(51,51,51);font-family:monospace;font-size:12px"><br style="color:rgb(51,51,51);font-family:monospace;font-size:12px"><span style="color:rgb(51,51,51);font-family:monospace;font-size:12px;white-space:nowrap">Sincerely,</span><br style="color:rgb(51,51,51);font-family:monospace;font-size:12px"><br style="color:rgb(51,51,51);font-family:monospace;font-size:12px"><br style="color:rgb(51,51,51);font-family:monospace;font-size:12px"><br style="color:rgb(51,51,51);font-family:monospace;font-size:12px"><span style="color:rgb(51,51,51);font-family:monospace;font-size:12px;white-space:nowrap">Gopal T V</span><br clear="all"><div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><pre style="color:rgb(0,0,0)">0 9840121302
<a href="https://vidwan.inflibnet.ac.in/profile/57545" target="_blank">https://vidwan.inflibnet.ac.in/profile/57545</a>
<a href="https://www.facebook.com/gopal.tadepalli" target="_blank">https://www.facebook.com/gopal.tadepalli</a>
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Dr. T V Gopal
Professor
Department of Computer Science and Engineering
College of Engineering
Anna University
Chennai - 600 025, INDIA
Ph : (Off) 22351723 Extn. 3340
      (Res) 24454753
Home Page : <a href="http://www.annauniv.edu/staff/gopal" target="_blank">http://www.annauniv.edu/staff/gopal</a>
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</pre></div></div></div></div></div></div></div><br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Sat, Oct 2, 2021 at 9:40 PM Maureen Hilyard via Apralo-policy <<a href="mailto:apralo-policy@icann.org">apralo-policy@icann.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr">Hi everyone<div><span style="color:rgb(0,0,0)">FYI - A new report is out about Phishing (attacks that steal user data)  : </span><a href="https://interisle.net/PhishingLandscape2021.html" target="_blank">https://interisle.net/PhishingLandscape2021.html</a><br></div><div><div style="color:rgb(0,0,0)"><p class="MsoNormal"><u></u></p><p class="MsoNormal"><u></u> <u></u></p><p class="MsoNormal">Some key takeaways from the report:<u></u><u></u></p><ul type="disc" style="margin-bottom:0in"><li class="MsoNormal" style="margin-left:15px;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><b>Most phishing is concentrated at small numbers of domain registrars, domain registries, and hosting providers.</b> 69% of the domains used for phishing were registered in 10 Top-level Domains and 69% were registered through just 10 registrars.<u></u><u></u></li><li class="MsoNormal" style="margin-left:15px;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><b>Phishing attacks are disproportionately concentrated in new gTLDs (nTLDs).</b> While the new TLDs' market share decreased during our yearly reporting period, phishing among the new TLDs has increased.<u></u><u></u></li><li class="MsoNormal" style="margin-left:15px;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><b>Phishing domain registrations in some TLDs are overwhelmingly dominated by a small number of registrars.</b> In some cases, 90% or more of the malicious domains in a TLD were registered through one gTLD registrar.<u></u><u></u></li><li class="MsoNormal" style="margin-left:15px;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><b>41% of all phishing attacks occurred at just ten hosting providers.</b> We identified 4,110 hosting networks (ASNs) where phishing web sites were reported. 28% of all phishing attacks occurred on just four hosting networks.<u></u><u></u></li><li class="MsoNormal" style="margin-left:15px;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><b>Phishers targeted 1,804 businesses or organizations during the 1 May 2020 to 30 April 2021 period.</b> The top 10 brands targeted over the course of our annual period account for 46% of the reported phishing attacks.<u></u><u></u></li><li class="MsoNormal" style="margin-left:15px;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><b>When phishers register domains, they tend to use them quickly.</b> 57% of domains reported for phishing were used within 14 days following registration and more than half of those were used within 48 hours.</li></ul><div><br></div><div>Maureen</div></div></div></div>
_______________________________________________<br>
Apralo-policy mailing list<br>
<a href="mailto:Apralo-policy@icann.org" target="_blank">Apralo-policy@icann.org</a><br>
<a href="https://mm.icann.org/mailman/listinfo/apralo-policy" rel="noreferrer" target="_blank">https://mm.icann.org/mailman/listinfo/apralo-policy</a><br>
<br>
_______________________________________________<br>
By submitting your personal data, you consent to the processing of your personal data for purposes of subscribing to this mailing list accordance with the ICANN Privacy Policy (<a href="https://www.icann.org/privacy/policy" rel="noreferrer" target="_blank">https://www.icann.org/privacy/policy</a>) and the website Terms of Service (<a href="https://www.icann.org/privacy/tos" rel="noreferrer" target="_blank">https://www.icann.org/privacy/tos</a>). You can visit the Mailman link above to change your membership status or configuration, including unsubscribing, setting digest-style delivery or disabling delivery altogether (e.g., for a vacation), and so on.</blockquote></div>