Plugavel.
  • Home
  • Tech
  • Car
  • More
    • Privacy policy
    • About us
    • Contact us
No Result
View All Result
Plugavel.
  • Home
  • Tech
  • Car
  • More
    • Privacy policy
    • About us
    • Contact us
No Result
View All Result
Plugavel.
No Result
View All Result
ADVERTISEMENT

Robot portrait of phishing victims

17 de December de 2021
in Tech
L’ETH Zurich a étudié le comportement de 14.000 employés face au phishing pour établir un portrait-robot. © magann, Adobe Stock
ADVERTISEMENT

ETH Zurich, together with an unnamed company, has just completed one of the largest phishing studies with more than 14,000 participants over 15 months. This gave researchers a better understanding of who is susceptible to phishing and what solutions work.

To better combat the consequences of phishing, it is important to know the profile of the people who are susceptible to it. To this end, the Swiss Federal Institute of Technology Zurich carried out a large-scale study involving more than 14,000 employees of the same company, on a duration 15 months. Participants were not aware of the study, but were told the company could test them with fake messages.

Researchers sent fake phishing emails to employees’ work addresses, which were therefore mixed with legitimate emails as well as regular spam messages. They also integrated a button into the company’s email software that allowed for suspicious emails to be flagged. They were able to portray the people who interact with malicious messages and those who report them.

Younger people more susceptible to phishing

Unlike previous research, the study found no correlation between gender and susceptibility to phishing. The authors attribute the previous results to a bias in the gender distribution of work. However, they discovered that it is first of all the youngest (18-19 years old) who click on the fraudulent messages, with a clear decrease for 20-29 year olds. The number of dangerous actions recorded then increases up to the age of 60, after which it drops suddenly.

Employees who used specialized software were more likely to click on fraudulent messages, which qualifies the assumption often used in studies that only the time of computer use is sufficient to determine the level of computer literacy. In the end, just over 32% of employees ended up clicking at least once on a link or attachment during the 15 months of the study.

Collaborative tools are effective

The researchers also studied the effectiveness of measures against phishing. For some of the participants, the email software displayed a short message at the top of the fake email, similar to that of Microsoft Outlook, indicating that he had theair suspect. Others saw a more detailed message, and a third group had no warning. The presence of a warning divides the number of interactions with the email by three, but a more detailed notification is not more effective.

Half of those who clicked on an email phishing were redirected to a voluntary training page against phishing, a common practice in companies to train their employees against phishing. Oddly enough, the exercise was counterproductive, as those who participated were more susceptible to unwanted messages afterwards.

The last result is particularly interesting because it concerns the reports of unwanted messages. Just five minutes after sending a series of emails, researchers had already received 10% of reports, and 30% within half an hour. In addition, they found no decrease in the number of reports during the 15 months of the study. This means that a company can set up a collaborative tool to detect phishing campaigns, which will be effective and reagent, and will not take a lot of employee time.

What you must remember

  • The youngest employees are most susceptible to phishing.
  • Practices against phishing after clicking on a fraudulent message are counterproductive.
  • Collaborative tools can be a solution to reacting to phishing campaigns quickly.

Interested in what you just read?

.

ADVERTISEMENT
Tags: Computer sciencecybersecuritye-mailETH ZurichOffice automationphishingPortraitrobotvictims
ShareTweetPin

Related Posts

Une fonction liée à iOS 15 rend les plus iPhone plus vulnérables. © Apple
Tech

A dead iPhone can be hacked!

You will also be interested Phishing: what is it and how to prevent it? Phishing, or phishing in English, is...

21 de May de 2022
Réseau informatique © Gerd Altmann, Pixabay
Tech

CCNA2 training: get 89% off thanks to this good plan

Are you in professional retraining or want to progress in your career by taking the official Cisco CCNA 200-301 certification...

21 de May de 2022
Bénéficiez d'une réduction sur la formation à SketchUp © black_mts, Adobe Stock
Tech

SketchUp: get 89% off the full course

Amateurs, students or professionals in the fields of technical drawing and architecture, you want to train in 3D modeling with...

21 de May de 2022
Le métavers donne naissance à des mondes virtuels dans lesquels chacun peut s’immerger et vivre une vie parallèle. © garrykillian, Adobe Stock
Tech

Who invented the metaverse?

The metaverse was the result of long decades of reflection, whether by science fiction authors, engineers or even simple geeks....

21 de May de 2022
Next Post
10 pieces of equipment to buy before riding in the mountains

10 pieces of equipment to buy before riding in the mountains

Mohammed Ben Sulayem: who is the first non-European president of the FIA?

Mohammed Ben Sulayem: who is the first non-European president of the FIA?

Recommended

Samsung Galaxy S22: take advantage of the pre-order offer for this new smartphone!

27 de February de 2022
WordPress training: up to -89% discount in good deal with Udemy

WordPress training: up to -89% discount in good deal with Udemy

21 de April de 2021

Neuralink: a complaint filed for animal abuse during experiments with the brain implant

16 de February de 2022

RED By SFR: a free Xiaomi Redmi Note 10 5G, yes, it’s possible by subscribing to the 100 GB mobile plan

18 de February de 2022
ADVERTISEMENT

Categories

  • Car
  • Carros
  • Tech
  • Tecnologia
ADVERTISEMENT
  • Home
  • Privacy policy
  • About us
  • Contact us
© 2021 Plugavel - News about technology and cars on one site Plugavel.
No Result
View All Result
  • Home
  • Tech
  • Car
  • More
    • Privacy policy
    • About us
    • Contact us