comparative reviews

Off the Hook: Who Gets Phished and Why

Communication researchers at four major universities have found that if you receive a lot of email, habitually respond to a good portion of it, maintain a lot of online relationships and conduct a large number of transactions online, you are more susceptible to email phishing expeditions than those who limit their online activity.

The study, “Why Do People Get Phished?” forthcoming in the journal, Decision Support Systems and Electronic Commerce, uses an integrated information processing model to test individual differences in vulnerability to phishing.

The study is particularly pertinent, given the rash of phishing expeditions that have become public of late, the most recent involving the online marketing firm Epsilon, whose database was breached last week by hackers, potentially affecting millions of banking and retail customers.

Email “phishing” is a process that employs such techniques as using the names of credible businesses (American Express, eBay), government institutions (Internal Revenue Service, Department of Motor Vehicles), or current events (political donations, Beijing Olympic tickets, aiding Katrina victims) in conjunction with statements invoking fear, threat, excitement, or urgency, to persuade people to respond with personal and sensitive information like usernames, passwords and credit card details. Continue reading…

Related Posts

The Spoils of the Android Wars I have poor impulse control. Though I manage to avoid most major vices, including all the illegal ones, I do have a gigantic closet full of formerly c...
Hey, You, Get off of My Cloud The emerging Public Cloud versus Private Cloud debate is not just about which solution is best. It extends to the very definition of cloud. I won’t p...
Ubuntu 9.10 Live CD and Mandriva One 2010: Reviewed and Compared I'm used to reviewing one distro at a time, and that has worked quite well. You could read a review and assuming it is well written and detailed, deci...
Feature overview of Linux and BSD firewall and router distributions Note: This post features two, long tables. Unless you want to scroll from here to Burkina Faso, it is highly recommended that you do not try to view t...
Linux Mint 8 vs Ubuntu 9.10 On the surface, trying to write a comparative review of Linux Mint 8 (Helena) and Ubuntu 9.10 (Karmic koala) would seem like a pointless exercise. Aft...
In Data Portability Deathmatch, Users Lose Out In the last few weeks, Facebook and Google have been engaging in a public tussle over an issue that is near and dear to EFF's heart: data portabilit...
Tags:

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*