{"id":298,"date":"2005-11-28T20:24:23","date_gmt":"2005-11-28T20:24:23","guid":{"rendered":"http:\/\/www.darrenstraight.com\/blog\/2005\/11\/28\/can-you-spot-the-phish-attack\/"},"modified":"2005-11-28T20:24:23","modified_gmt":"2005-11-28T20:24:23","slug":"can-you-spot-the-phish-attack","status":"publish","type":"post","link":"https:\/\/www.darrenstraight.com\/blog\/2005\/11\/28\/can-you-spot-the-phish-attack\/","title":{"rendered":"Can You Spot The Phish Attack?"},"content":{"rendered":"<p>Hey I have just been told about this phishing article from my friend Laurent, so thanks goes to him for telling me about it, don&#8217;t forget to test your self on the quiz!<\/p>\n<blockquote><p>Knowing the difference between a legitimate e-mail and a scammed phishing e-mail is not always as easy as one would think. <\/p>\n<p>According to data from e-mail security firm MailFrontier, only 4 percent of users can spot a phished e-mail 100 percent of the time. That&#8217;s a very sobering thought as the holiday season is upon us and Americans flock online for their shopping needs. <\/p>\n<p>MailFrontier&#8217;s data comes from its Phishing IQ Test, which is comprised of 10 examples of e-mails and users must choose whether they think the mail is legitimate, a fraud or if they have no answer. <\/p>\n<p>The example e-mails are from Chase, PayPal, Bank of America, Washington Mutual, MSN, EarthLink and Amazon. <\/p>\n<p>The average score in 2005, according to MailFrontier, is 75 percent, which is up from 61 percent in 2004. <\/p>\n<p>Andrew Klein, manager with the MailFrontier Threat Center, noted that improvement in test takers&#8217; ability to spot a phishing attempt occurred over time. <\/p>\n<p>&#8220;We believe this is the result of people becoming more aware of phishing in general,&#8221; Klein told internetnews.com. &#8220;They got more suspicious.&#8221; <\/p>\n<p>One of the surprising results of the survey, according to Klein, is that younger people (18-24) are more likely than older people (55+) to be fooled by a phishing attack. <\/p>\n<p>MailFrontier said there are five main myths surrounding phishing. <\/p>\n<p>The first myth is that users can actually detect a phishing attack. Though they are getting better at identifying phishing attacks, Klein argues that there is still a good chance someone will consider a phishing e-mail to actually be legitimate. <\/p>\n<p>The second myth is that spam filters can detect and stop phishing attacks. <\/p>\n<p>&#8220;By now most people agree that spam and phishing e-mail are different, with phishing e-mail designed to look like legitimate transactional e-mail a user would expect to receive,&#8221; Klein noted. &#8220;To catch a phish, a different set of evaluation criteria is required to help distinguish the legitimate from the phishing e-mail.&#8221; <\/p>\n<p>Domain authentication as a vehicle to stop phishing e-mail is the third phishing myth. Klein argues that spammers, as well as phishers, have already shown they can publish authentication records for the domains they obtain. <\/p>\n<p>The fourth myth is that detecting URL exploits can stop phishing attacks. <\/p>\n<p>&#8220;URL exploits are a good indicator that something is amiss, but by itself they cannot be proof positive,&#8221; Klein explained. &#8220;Legitimate companies use techniques like URL redirection, long URLs (which run beyond the end of the status bar) and even raw IP addresses in their legitimate e-mail.&#8221; <\/p>\n<p>&#8220;Phishers understand the legitimate uses and take advantage of them.&#8221; <\/p>\n<p>Lastly and perhaps most importantly is the myth that users don&#8217;t need to do anything to protect themselves and their companies from phishing e-mail. <\/p>\n<p>Doing nothing can lead to the loss of personal, financial and even corporate information. MailFrontier forecast that phishing e-mail will be up by 25 percent from 750 million last year to 1 billion this year. <\/p>\n<p>Will this criminal deluge continue unabated, or is there a way to beat phishing? Klein asserts that it can&#8217;t be beaten but it can be made economically unattractive. <\/p>\n<p>&#8220;Spam has not quite disappeared yet. Neither have viruses. So I don&#8217;t think phishing will, either,&#8221; Klein said. &#8220;The idea is to raise the technological, awareness, and economic hurdles so high that the phishers move on to the next exploitation.&#8221; <\/p><\/blockquote>\n<p>Source: <a href=\"http:\/\/www.internetnews.com\/security\/article.php\/3566071\">internetnews.com<\/a><br \/>\n<a href=\"http:\/\/survey.mailfrontier.com\/survey\/quiztest.html\">MailFrontier Phishing IQ Test II <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hey I have just been told about this phishing article from my friend Laurent, so thanks goes to him for telling me about it, don&#8217;t forget to test your self on the quiz! Knowing the difference between a legitimate e-mail and a scammed phishing e-mail is not always as easy as one would think. According to data from e-mail security<\/p>\n<div class=\"clearfix\"><\/div>\n<div class=\"pull-left padding-top-25\"><a href=\"https:\/\/www.darrenstraight.com\/blog\/2005\/11\/28\/can-you-spot-the-phish-attack\/\" class=\"btn btn-theme\">Continue reading<span class=\"screen-reader-text\"> &#8220;Can You Spot The Phish Attack?&#8221;<\/span> <i class=\"fa fa-fw fa-long-arrow-right\"><\/i> <\/a>  <\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-298","post","type-post","status-publish","format-standard","hentry","category-general"],"_links":{"self":[{"href":"https:\/\/www.darrenstraight.com\/blog\/wp-json\/wp\/v2\/posts\/298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.darrenstraight.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.darrenstraight.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.darrenstraight.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.darrenstraight.com\/blog\/wp-json\/wp\/v2\/comments?post=298"}],"version-history":[{"count":0,"href":"https:\/\/www.darrenstraight.com\/blog\/wp-json\/wp\/v2\/posts\/298\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.darrenstraight.com\/blog\/wp-json\/wp\/v2\/media?parent=298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.darrenstraight.com\/blog\/wp-json\/wp\/v2\/categories?post=298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.darrenstraight.com\/blog\/wp-json\/wp\/v2\/tags?post=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}