Criminals always look for the latest angles – the best resources to use, the best places to
find victims, and the best ways to avoid detection. By analyzing the phishing that took
place in the second half of 2013, we’ve gathered a great deal of information about how
phishers perpetrated their attacks.
This report seeks to understand trends and their significance by quantifying the scope of
the global phishing problem. Specifically, this new report examines all the phishing attacks
detected in the second half of 2013 (“2H2013”, July 1 to December 31). The data was
collected by the Anti-Phishing Working Group, and supplemented with data from several
phishing feeds, CNNIC, and private sources. The APWG phishing repository is the Internet’s
most comprehensive archive of phishing and e-mail fraud activity. We are grateful to
CNNIC and the Anti-phishing Alliance of China (APAC) for sharing their data with us
full doc here......http://docs.apwg.org/reports/APWG_GlobalPhishingSurvey_2H2013.pdf
find victims, and the best ways to avoid detection. By analyzing the phishing that took
place in the second half of 2013, we’ve gathered a great deal of information about how
phishers perpetrated their attacks.
This report seeks to understand trends and their significance by quantifying the scope of
the global phishing problem. Specifically, this new report examines all the phishing attacks
detected in the second half of 2013 (“2H2013”, July 1 to December 31). The data was
collected by the Anti-Phishing Working Group, and supplemented with data from several
phishing feeds, CNNIC, and private sources. The APWG phishing repository is the Internet’s
most comprehensive archive of phishing and e-mail fraud activity. We are grateful to
CNNIC and the Anti-phishing Alliance of China (APAC) for sharing their data with us
full doc here......http://docs.apwg.org/reports/APWG_GlobalPhishingSurvey_2H2013.pdf