Home

Results 1 - 10 of 5,894 for deceptive. Search took 0.907 seconds.  
Sort by date/Sort by relevance
Multi-Layered Approach 7Symantec Confidential Fraud is Bigger Threat than Spam to Email Security Ability to do business onlineAbility to use email as a communication medium Key Threat Customers and potential customers EmployeesGroup Targeted BrandIT ResourcesAsset Attacked ExternalInternalRange of Damage FraudSpam 8Symantec Confidential Messages Are Deceptive Email: Messages appear legitimate … except for fraudulent URLs http://205.214.89.85/ebay.html www.citibank.com:ac%398HAAA9UWDTYAZJWV WAAAA9pYWwgc2l6ZT00PjxTVgc2l6ZT00PjxT3Aa c%398HAAA9UWDTYAZJWVWAAAA9pYWwgc2l6 ZT00PjxTVgc2l6ZT00PjxT@211.155.234.84 9Symantec Confidential Websites Are Also Deceptive Websites: Fraudulent sites often look more “real” than the legitimate sites Exploits Microsoft I.E. “%01” vulnerability to display a legitimate URL Legitimate Site (with warning) Fraudulent Site 10Symantec Confidential Growth and Impact of Email Fraud SourceDescriptionCost FTCEstimated number of people reporting fraud to FTC3% Number of FDIC fraud messages caught by Brightmail in one week in January 2004 US Population fallen victim to Identity Theft Individual time spent recovering from Identity Theft Cost of Identity Theft in last 5 years in US Brightmail3.5 million Gartner3.4% Identity Theft Resource Center 600 hours FTC$60 Billion High Profile Attacks Yahoo, Earthlink, AOL, AT&T, MSN, MSNTV…Service Provider EBay, Best Buy, PayPal, Microsoft, Sony, Target, UPS, Fedex, British Airways, Monster.com, 1-800-Flowers.com… Consumer Citibank, Visa, Fleet Bank, Barclays Bank, NatWest, Lloyds TSB, Nationwide, Halifax, Bank One, Bank of America, Wells Fargo, Bank of Montreal, Schwab… Financial Services The Scope of the Spam Problem Understanding Spam Spam Continues to Grow and Evolve Claimed Region of Origin Non-English Spam is not Insignificant Solution to Spam? Multi-Layered Approach Fraud is Bigger Threat than Spam to Email Security Messages Are Deceptive Websites Are Also Deceptive Growth and Impact of Email Fraud
Language:English
Score: 1262244.5 - https://www.itu.int/osg/spu/sp...ntations/SALEM_Session%201.pdf
Data Source: un
Deceptive recruitment and coercion - InfoStories Skip to content Go to ILO main website English ILO - International Labour Organization InfoStories Deceptive recruitment and coercion Story navigation Share story Close share menu Share This section This story on Twitter Facebook LinkedIn 1 / 7 Deceptive recruitment and coercion Go to first slide Introduction What is forced labour? (...) Go to next slide Published in December 2015 · Updated in May 2016 Forced Labour Deceptive recruitment and coercion Forced labour can take many different forms. (...) Lured by a job, trapped in forced labour Forced labour by gender The recruitment process The use of coercion is very often subtle and hard to detect. Deception is the most common form of “recruitment” when it comes to forced labour.
Language:English
Score: 1229850.3 - https://www.ilo.org/infostorie...ptive-Recruitment-and-Coercion
Data Source: un
But I submit, that for indigenous communities there are normally only two stages; greed and deception. Greed is the motive, and deception includes all the lies that allege that an indigenous people are less entitled to their homes and to their lives. Nobody can prevent greed, but the deceptions can be fought with education and public awareness of the humanity of the indigenous communities. (...) For fifty four years West Papua has been the victim of such a deception, a deception at the United Nations alleging that the reporting of the progress of the colony could be exercised by the General Secretary U Thant instead of the Trusteeship Council as is required by the Charter of the United Nations.
Language:English
Score: 1228419.1 - https://www.un.org/esa/socdev/...ocs-updates/Statemen_Anari.pdf
Data Source: un
The exhibition of the set of posters on  State of Deception: the Power of Nazi Propaganda  was displayed until 15 February 2017.           (...) The day-long exhibition  State of Deception: The Power of Nazi Propaganda  was formally opened by the special guests. (...) In all the activities, the set of posters on  State of Deception: The Power of Nazi Propaganda  was displayed.  
Language:English
Score: 1216515.6 - https://www.un.org/en/holocaustremembrance/observance/2017
Data Source: un
The exhibition of the set of posters on  State of Deception: the Power of Nazi Propaganda  was displayed until 15 February 2017.           (...) The day-long exhibition  State of Deception: The Power of Nazi Propaganda  was formally opened by the special guests. (...) In all the activities, the set of posters on  State of Deception: The Power of Nazi Propaganda  was displayed.  
Language:English
Score: 1216515.6 - https://www.un.org/en/node/75272
Data Source: un
It contains information to ensure they are aware of their rights and responsibilities, potential work environment and related challenges, and support mechanisms to protect them against exploitation and deception. Fair recruitment Training Handbook for Briefing Officers on providing effective pre-departure orientation to migrant workers ١٠ ديسمبر, ٢٠٢٠ This Training Handbook is for Briefing Officers at the Protectorate of Emigrants Offices (Pakistan) who are mandated to provide pre-departure orientation to migrant workers with the aim to prepare them for safe migration to countries of destination, make them aware of their rights, responsibilities, working conditions, potential challenges, support services/grievance mechanisms to seek justice in case of exploitation and deception.
Language:English
Score: 1193044.5 - https://www.ilo.org/global/top...cts/reframe/lang--ar/index.htm
Data Source: un
Abuse of vulnerability 2. Deception 3. Restriction of movement 4. Isolation 5. (...) Abuse of vulnerability 4 • Deceptive recruitment practices  and false promises, for example,  about: • Wages. • Working conditions. • Type of work. • Housing and living  conditions. • Job location. • Identity of employer. • Children often end up in forced  labour because of false promises  made to their parents. 2. Deception 5 • Restriction of workers’   movement, for example,  through: • Locking up factory or  dormitory doors. • Surveillance cameras  and guards. • Prohibition to go  outside without being  accompanied by  guards. 3. 
Language:English
Score: 1156961.2 - www.ilo.org/wcmsp5/grou...s/presentation/wcms_346427.pdf
Data Source: un
Abuse of vulnerability 2. Deception 3. Restriction of movement 4. Isolation 5. (...) Abuse of vulnerability 4 • Deceptive recruitment practices  and false promises, for example,  about: • Wages. • Working conditions. • Type of work. • Housing and living  conditions. • Job location. • Identity of employer. • Children often end up in forced  labour because of false promises  made to their parents. 2. Deception 5 • Restriction of workers’   movement, for example,  through: • Locking up factory or  dormitory doors. • Surveillance cameras  and guards. • Prohibition to go  outside without being  accompanied by  guards. 3. 
Language:English
Score: 1156961.2 - https://www.ilo.org/wcmsp5/gro...s/presentation/wcms_346427.pdf
Data Source: un
United Nations Headquarters to Host Official Opening of Poster Exhibition ‘State of Deception: the Power of Nazi Propaganda’, 24 January | Meetings Coverage and Press Releases Skip to main content Welcome to the United Nations Meetings Coverage and Press Releases Search the United Nations Search Advanced Search Toggle navigation Home Secretary-General Latest Press Releases Press Conferences General Assembly Latest Meetings Coverage Press Releases Security Council Latest Meetings Coverage Press Releases Press Conferences Economic and Social Council Latest Meetings Coverage Press Releases International Court of Justice United Nations Print Note to Correspondents Note No. 6493 19 January 2017 United Nations Headquarters to Host Official Opening of Poster Exhibition ‘State of Deception: the Power of Nazi Propaganda’, 24 January The Department of Public Information will officially open a provocative exhibition from the United States Holocaust Memorial Museum on the important role of propaganda in bringing the Nazi Party to power, and in preparing the way for the Final Solution that resulted in the murder of 6 million Jewish people during the Holocaust. Titled “State of Deception: The Power of Nazi Propaganda”, the poster exhibition will open at 6 p.m. on 24 January, in the Visitors’ Lobby at United Nations Headquarters in New York.  
Language:English
Score: 1139351.5 - https://www.un.org/press/en/2017/note6493.doc.htm
Data Source: un
Microsoft PowerPoint - nshimbi-comesa-cybercrime-activities-lusaka-aug-08.ppt COMESA Deterring CyberCrime August 25th – 28th, 2008 Lusaka, Zambia Presenter: Isabel Nshimbi Information Systems Analyst COMESA Secretariat 2 “Security is not a product, but a process..” . 3 Focus: • Definitions • Secretariat Approach • Levels of Security • Regional Initiatives • Best Practises 4 CyberSecurity and CyberCrime… CyberSecurity: The protection of data and systems in networks that are connected to the Internet (PCMag) CyberCrime: Crimes perpetrated over the Internet, typically having to do with online fraud Multi-billion dollar problem 5 The Crimes… downloading illegal music files stealing money from online bank accounts creating and distributing viruses posting confidential business information on the Internet identity theft – phishing – pharming Broad scope of criminal activity, so we have to be careful where we enter our personal information 6 The Criminals… Hackers, alone or in groups – Deceptive Duo – Global Hell – Darkside Hackers – Conflict Virus Creators Employees (former, disgruntled…) Financial Institution Insiders 7 Cases… 1999 – Hacking into and De-Facing of Government Website in Zambia – Hackers gained access to personal e-mail accounts on free Hotmail service 2005 – Intrusions into Government Computers and Defacing Websites in US by the Deceptive Duo 2008 – Former Employee in local firm in Phillipines – access to and copying of firm’s secret information 8 .
Language:English
Score: 1132145.4 - https://www.itu.int/ITU-D/cyb/...e-activities-lusaka-aug-08.pdf
Data Source: un