KEEPING UP WITH THE JONESES: ASSESSING PHISHING SUSCEPTIBILITY IN AN TASK. North Carolina State University, Raleigh, NC

Size: px
Start display at page:

Download "KEEPING UP WITH THE JONESES: ASSESSING PHISHING SUSCEPTIBILITY IN AN EMAIL TASK. North Carolina State University, Raleigh, NC"

Transcription

1 KEEPING UP WITH THE JONESES: ASSESSING PHISHING SUSCEPTIBILITY IN AN TASK Kyung Wha Hong 1, Christopher M. Kelley 2, Rucha Tembe 2, Emerson Murphy-Hill 1 & Christopher B. Mayhorn 2 1 Department of Computer Science, 2 Department of Psychology, North Carolina State University, Raleigh, NC Most prior research on preventing phishing attacks focuses on technology to identify and prevent the delivery of phishing s. The current study supports an ongoing effort to develop a user-profile that predicts when phishing attacks will be successful. We sought to identify the behavioral, cognitive and perceptual attributes that make some individuals more vulnerable to phishing attack than others. Fifty-three participants responded to a number of self-report measures (e.g., dispositional trust) and completed the Bob Jones task that was designed to empirically evaluate phishing susceptibility. Over 92% of participants were to some extent vulnerable to phishing attacks. Additionally, individual differences in gender, trust, and personality were associated with phishing vulnerability. Application and implications for future research are discussed. INTRODUCTION Cybersecurity involves a complex interaction between users and technology. While security threats might take a variety of forms such as viruses or worms delivered via nefarious websites or USB drives, theft using social engineering tactics such as phishing are becoming increasingly common and costly. Loss of time and increased stress levels are the immediate personal costs (Hardee, West, & Mayhorn, 2006). Long term personal costs are likely as well, such as decreased trust and usage of the internet for banking, shopping, and other conveniences (Dhamija & Tygar, 2005; Kelley, Hong, Mayhorn, & Murphy-Hill, 2012). In terms of economic losses, a recent survey (Gartner, 2007) indicates phishing attacks caused a loss of 3.2 billion dollars based on a sample of 4500 adults with an average of $866 lost per phishing occurrence. Moreover, phishing targeted at administrators can compromise entire systems and user communities (Schwartz, 2011). The goal of this research is to develop a userprofile that predicts when and where phishing attacks will be successful. Such a user-profile could be useful to help identify behavioral, cognitive, and perceptual differences that make some users more susceptible to phishing than others. For instance, individual differences in trust and cognitive and attentional capacity have been identified separately as contributing to phishing susceptibility. However, no one has constructed a unified user-profile that combines individual differences to proactively identify individual users who are prone to being successfully phished. Participants METHOD Fifty-three undergraduate students were recruited to complete an experiment (Table 1). Participants were tested individually in sessions that lasted approximately two hours and given extracredit as compensation. Materials The experiment was completed in two stages such that participants completed an online survey and then a laboratory session.

2 Self-report measures. Participants completed a survey that measured demographic characteristics such as age, gender, and primary language as well as previous experiences with phishing, online purchasing behavior, and general computing behavior (based on Eveland, Shah, & Kwak, 2003; Yoshioka, Washizaki, & Maruyama, 2008). Participants also responded to measures of dispositional trust (Merritt & Ilgen, 2008), impulsivity (Neyste & Mayhorn, 2009), and personality (Gosling, Rentfrow, & Swann, 2003). Table 1 Participant Characteristics M SD Range be from careerbuilder.com, a legitimate website representing a real company (even with their logo). Also it seems to give useful information to the user. However, if a user clicks on the links included in the , it actually leads them to a website that is not related to careerbuilder s official website. Disguising the sender or source of an by making it look like a legitimate company is a typical tactic used to create phishing s. Figure 1 Example Phishing Age Frequencies Gender Male Female Race Caucasian/Non-hispanic Language English Primary Major Computer Science Psychology 60% 40% 80% 96% 34% 66% Participants were given the following instructions: Behavioral measures. To empirically assess phishing susceptibility, participants completed an task where they were asked to access a Google Mail account for a character named Bob Jones and categorize 14 messages (Table 2). Table 2 Messages Divided by Category Category Phishing 7 Spam 1 Malware 1 Legitimate 5 Total 14 Figure 1 shows one of the phishing s we used as stimuli in this experiment. This appears to n When you are going through each , do as you normally do. For example, if you normally read each carefully do as you usually do. Or if you usually skim through each message quickly that s also fine, too. After going through an you have to make a decision about the . If you think is legitimate and you d like to respond (e.g., reply, click on a link, download a file) to the , then mark Important. If you think is legitimate but doesn t need any response and would like to just archive, leave it as it is. If you think is not legitimate, suspicious, or spam, then Delete. Procedure

3 After providing informed consent and completion of the self-report measures delivered online, participants visited the laboratory where a battery of cognitive tests and the Bob Jones task were administered. The cognitive tests included a measure of working memory capacity (WMC) (Unsworth, Heitz, Schrock, & Engle, 2005), crystallized intelligence (Shipley, 1986), spatial ability (Peters et al., 1995; Vandenberg & Kuse, 1978), and sustained attention (Temple et al., 2000). Upon completion of the cognitive tests, instructions for the Bob Jones task were delivered. Finally, participants were debriefed and dismissed. RESULTS Responses to self-report measures were captured via an online survey tool, Qualtrics, and the results of the cognitive tests and the Bob Jones task were entered into SPSS for analysis. Survey Results Prior phishing experience. Many respondents indicated that they had previous phishing experience via . For instance, 25% reported glancing at the contents of a phishing whereas 36% admitted to completely reading a phishing message. Thirty percent were compelled to ask someone else whether they thought the was authentic whereas 11% reported contacting an authority (e.g., bank). The most severe phishing consequences seemed to be relatively rare with 15% clicking on a link, 8% installing a virus/malware, and 6% entering personal information. Of those who entered personal information, name (6%) and password (6%) comprised the information provided to phishers. Most frequent consequences of worst experience included noticed unusual activity in an online account (15%) and reduced online activity (15%). Based on this previous experience, 89% agreed that they were confident that they can tell the difference between a legitimate and one sent by a scammer. Behavioral Results Bob Jones task performance. To ascertain phishing susceptibility, a score that ranged from 0 (perfect ability) to 100 (no ability) was calculated for participant s ability to identify phishing s. The data suggested more than 92% of participants were susceptible to phishing with only 4 participants (7.5% of the sample) successfully identifying all of the phishing s and approximately 52% misclassifying more than half of the phishing s. Since phishing also impacts the ability of people to identify legitimate s, the number of authentic s that were incorrectly deleted was assessed. Fifty-four percent deleted at least one authentic . Individual differences correlated with accuracy. The ability to correctly identify phishing s revealed gender, trust, and personality were correlated with phishing vulnerability. For example, women were less likely than men to correctly identify phishing s, t(51) = -2.15, p <.036. Dispositional trust, extraversion and openness to new experience were correlated with deleting legitimate s. Specifically, less trusting individuals, r(52) = -.30, p <.034, introverts, r(53) = -.29, p <.054, and those less open to new experiences, r(53) = -.435, p <.002, were more likely to delete legitimate s. Severity of misclassification. In addition, because misclassifying some s could have more severe consequences than others, five classes of severity were created that ranged from 1 to 5. (Class 1:legitimate no danger, Class 2:spam or sent to numerous recipients no danger but less useful, Class 3:phishing redirecting to unexpected site no danger, Class 4:phishing with a danger of loosing less critical information, Class 5: phishing with a danger of losing money or critical information). Thus, when an was misclassified a severity score was assigned based on the participant s response (e.g., their classification) and the consequence of misclassifying that particular (Table 3). For example, if a participant responded with important for a phishing in severity class 4, the severity score for this response was assigned a score of 4. However, if this participant responded with delete for a phishing in severity class 5, the severity score for this response was assigned a score of 0. A total severity score due to misclassification was calculated as the sum of severity scores for

4 each response and ranged from 0 (no consequence) to 23 (severe consequence). Table 3 The Severity Score based on Severity Class and Participants responses Results revealed an average severity score of What s more, only 2% of participants correctly classified all s indicating approximately 98% would have experienced adverse consequences resulting from misclassification. DISCUSSION While the topic of phishing and social engineering is not new, the current focus on the human side of the HCI equation promises to expand our knowledge in this area. The preliminary results of the current study illustrate a number of findings. First, results suggest a disconnect between participants self-reported data and the empirical data collected from the Bob Jones task. Specifically, approximately 92% of participants misclassified phishing s even though 89% indicated they were confident of their ability to identify phishing s. These results suggest a majority of participants were not only susceptible to phishing attacks, but overconfident in their ability to protect themselves from such attacks. Second, only 2% of the participants suffered no adverse consequences due to misclassification of s during the task. Third, individual differences such as gender, dispositional trust, and personality appear to be associated with the ability to correctly categorize s as either legitimate or phishing. Limitations While these results are interesting, they should be interpreted with caution given several potential methodological and analytical limitations. For instance, reliance on self-report of prior behavior may be subject to memory biases. Likewise, the behavioral measure (Bob Jones task) could be described as artificial because participants were asked to role play; however, this methodology has been validated with prior research (Sheng et al., 2010). Moreover, analysis of the consequences of participants misclassification severity was based on a preliminary coding scheme developed by an individual rater. Current efforts are underway to provide inter-rater reliability for this measure and additional measures used in the Bob Jones task. The sample recruited for the current study consisted of college students. However, efforts are currently underway to recruit a more diverse set of participants (i.e., a non-student sample of working professionals). Recently, we collected data from volunteers employed at a government agency. Future analyses will compare the students and nonstudents to determine whether there are similarities that are common to the two groups and more importantly, how they vary in terms of phishing susceptibility. Future Research and Application These results contribute to an ongoing effort to develop a user profile that identifies those most at risk of being phished. One implication might be the ability to recommend a tailored anti-phishing training tool to a user who is determined to be vulnerable to phishing attack. Moreover, our efforts to investigate individual differences in phishing susceptibility are exemplified in a recent paper that describes how people from different cultures conceptualize phishing (Tembe, Hong, Murphy- Hill, Mayhorn, & Kelley, 2013). Further research will focus on refining this profiling procedure and using it to inform the design of a usable and effective tool to help users combat phishing attacks. Our plan is to develop a training tool that includes training contents reflecting the results from this study in addition to conventional training tools contents (e.g., disguised source, poor grammar, urgency cues, etc.). Moreover, we will analyze how our anti-phishing tool contributes to protecting users from the severe

5 consequences of phishing attacks compared to other tools that are currently on the market. ACKNOWLEDGEMENTS This research was supported by a National Security Agency Grant to the fourth and fifth authors. REFERENCES Dhamija, R., & Tygar, J. D. (2005). The battle against phishing: Dynamic security skins. Paper presented at the ACM International Conference Proceeding Series. Eveland, W. P., Shah, D. V., & Kwak, N. (2003). Assessing causality in the cognitive mediation model: A panel study of motivations, information processing, and learning during campaign Communication Research, 30(4), doi: / Gartner. (2007). Gartner survey shows phishing attacks escalated in 2007; more than $3 billion lost to these attacks. Retrieved from Gosling, S. D., Rentfrow, P. J., & Swann, W. B. (2003). A very brief measure of the big-five personality domains. Journal of Research in personality, 37(6), Hardee, J. B., West, R., & Mayhorn, C. B. (2006). To download or not to download: An examination of computer security decision making. interactions, 13(3), Kelley, C. M., Hong, K. W., Mayhorn, C. B., & Murphy-Hill, E. (2012). Something smells phishy: Exploring definitions, consequences, and reactions to phishing. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 56(1), doi: / Merritt, S. M., & Ilgen, D. R. (2008). Not all trust is created equal: Dispositional and history-based trust in humanautomation interactions. Human Factors: The Journal of the Human Factors and Ergonomics Society, 50(2), Neyste, P. G., & Mayhorn, C. B. (2009). Perceptions of cybersecurity: An exploratory analysis. Proceedings of the 17th world congress of the international ergonomics association. Beijing, China. Peters, M., Laeng, B., Latham, K., Jackson, M., Zaiyouna, R., & Richardson, C. (1995). A redrawn vandenberg and kuse mental rotations test-different versions and factors that affect performance. Brain and cognition, 28(1), Schwartz, M. J. (2011). Spear phishing attacks on the rise, InformationWeek. Retrieved from Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L. F., & Downs, J. (2010). Who falls for phish?: A demographic analysis of phishing susceptibility and effectiveness of interventions. Proceedings of the 28th international conference on Human factors in computing systems. Atlanta, Georgia, USA Shipley, W. C. (1986). Shipley institute of living scale. Los Angeles, CA: Western Psychological Services. Tembe, R., Hong, K. W., Murphy-Hill, E., Mayhorn, C. B., & Kelley, C. M. (2013). American and Indian Conceptualizations of Phishing. Proceedings of the 3 rd Workshop on Socio-Technical Aspects in Security and Trust. Temple, J. G., Warm, J. S., Dember, W. N., Jones, K. S., LaGrange, C. M., & Matthews, G. (2000). The effects of signal salience and caffeine on performance, workload, and stress in an abbreviated vigilance task. Human Factors: The Journal of the Human Factors and Ergonomics Society, 42(2), doi: / Unsworth, N., Heitz, R. P., Schrock, J. C., & Engle, R. W. (2005). An automated version of the operation span task. Behavior Research Methods, 37(3), Vandenberg, S. G., & Kuse, A. R. (1978). Mental rotations, a group test of three-dimensional spatial visualization. Perceptual and motor skills, 47(2), doi: /pms Yoshioka, N., Washizaki, H., & Maruyama, K. (2008). A survey on security patterns. Progress in Informatics, 5(5),

Data Breaches and Securing Healthcare Humans Kelli Tarala, Enclave Security

Data Breaches and Securing Healthcare Humans Kelli Tarala, Enclave Security Data Breaches and Securing Healthcare Humans Kelli Tarala, Enclave Security Data Breaches and Securing Healthcare Humans Problem Statement Data breaches & disclosures are becoming more common PrivacyRights.org

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

October Is National Cyber Security Awareness Month!

October Is National Cyber Security Awareness Month! (0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life

More information

Authenticating and policing the internet for consumer confidence and security

Authenticating and policing the internet for consumer confidence and security Authenticating and policing the internet for consumer confidence and security Secure On-Line ID Introduction Unique zero intervention at a glance solution Built on positive site validation Allows policing

More information

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Anti-Phishing Best Practices for ISPs and Mailbox Providers Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing

More information

Evaluating DMARC Effectiveness for the Financial Services Industry

Evaluating DMARC Effectiveness for the Financial Services Industry Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC

More information

Information Security Field Guide to Identifying Phishing and Scams

Information Security Field Guide to Identifying Phishing and Scams Information Security Field Guide to Identifying Phishing and Scams 010001010100101010001010011010101010101010101 01000101010011010010100101001010 1 Contents Introduction Phishing Spear Phishing Scams Reporting

More information

Email Correlation and Phishing

Email Correlation and Phishing A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...

More information

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach 100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

SEC-GDL-005-Anatomy of a Phishing Email

SEC-GDL-005-Anatomy of a Phishing Email Technology & Information Services SEC-GDL-005-Anatomy of a Phishing Email Author: Paul Ferrier Date: 07/11/2014 Document Security Level: Document Version: PUBLIC 0.98 Document Ref: SEC-GDL-005 Document

More information

Shield Your Business - Combat Phishing Attacks. A Phishnix White Paper

Shield Your Business - Combat Phishing Attacks. A Phishnix White Paper A Phishnix White Paper Shield Your Business - Combat Phishing Attacks Aujas Information Risk Services 19925 Steven s Creek Blvd, Suite 100, Cupertino, CA 95014-2358 Phone: 1.855.PHISHNX Fax : +1 408 973

More information

Cyber Security. Securing Your Mobile and Online Banking Transactions

Cyber Security. Securing Your Mobile and Online Banking Transactions Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet

More information

Incident Response Plan for PCI-DSS Compliance

Incident Response Plan for PCI-DSS Compliance Incident Response Plan for PCI-DSS Compliance City of Monroe, Georgia Information Technology Division Finance Department I. Policy The City of Monroe Information Technology Administrator is responsible

More information

SIMULATED ATTACKS. Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru MEASURE ASSESS

SIMULATED ATTACKS. Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru MEASURE ASSESS SIMULATED ATTACKS Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru Technical safeguards like firewalls, antivirus software, and email filters are critical for defending your infrastructure,

More information

Security Basics: A Whitepaper

Security Basics: A Whitepaper Security Basics: A Whitepaper Todd Feinman, David Goldman, Ricky Wong and Neil Cooper PricewaterhouseCoopers LLP Resource Protection Services Introduction This paper will provide the reader with an overview

More information

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced

More information

Influence of Social Networks on Cyber Security

Influence of Social Networks on Cyber Security Influence of Social Networks on Cyber Security Kate Coronges, MPH, PhD Network Science Center (NSC) & Behavioral Sciences and Leadership (BS COL Ron Dodge, PhD, Information & Education Technology Alysse

More information

SK International Journal of Multidisciplinary Research Hub

SK International Journal of Multidisciplinary Research Hub ISSN: 2394 3122 (Online) Volume 2, Issue 9, September 2015 Journal for all Subjects Research Article / Survey Paper / Case Study Published By: SK Publisher (www.skpublisher.com) Novel Method to Protect

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

Fighting spam in Australia. A consumer guide

Fighting spam in Australia. A consumer guide Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your

More information

HOW TO PREVENT SPAM AND MALWARE IN MAIL MOST EFFECTIVELY Index 1. Battling the increase in malware 2 2. Addressing the surplus of spam 3 3. The mail server A critical vulnerability 4 3.1 Denial of Service

More information

Phishing: Facing the Challenge of Email Identity Theft with Proper Tools and Practices

Phishing: Facing the Challenge of Email Identity Theft with Proper Tools and Practices Phishing: Facing the Challenge of Email Identity Theft with Proper Tools and Practices A Leadfusion White Paper 2012 Leadfusion, Inc. All rights reserved. The Threat of Phishing Email is an indispensable

More information

Practical tips for a. Safe Christmas

Practical tips for a. Safe Christmas Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

Recurrent Patterns Detection Technology. White Paper

Recurrent Patterns Detection Technology. White Paper SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware

More information

An innovative and comprehensive framework for Social Driven Vulnerability Assessment. 20 November 2014

An innovative and comprehensive framework for Social Driven Vulnerability Assessment. 20 November 2014 An innovative and comprehensive framework for Social Driven Vulnerability Assessment 20 November 2014 Who are we? Enrico Frumento (twitter: enricoff) ICT Security Specialist @ CEFRIEL Main Activities:

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

Information Security. Be Aware, Secure, and Vigilant. https://www.gosafeonline.sg/ Be vigilant about information security and enjoy using the internet

Information Security. Be Aware, Secure, and Vigilant. https://www.gosafeonline.sg/ Be vigilant about information security and enjoy using the internet Be Aware, Secure, and Vigilant Information Security Use the Internet with Confidence Be vigilant about information security and enjoy using the internet https://www.gosafeonline.sg/ The Smartphone Security

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

More Details About Your Spam Digest & Dashboard

More Details About Your Spam Digest & Dashboard TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How

More information

Email Security. 01-15-09 Fort Mac

Email Security. 01-15-09 Fort Mac Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

Protecting your business from some of the current fraud threats

Protecting your business from some of the current fraud threats Protecting your business from some of the current fraud threats This literature provides guidance on fraud prevention and is provided for information purposes only. Where noted the guidance provided has

More information

Barracuda Email Security Service User Guide

Barracuda Email Security Service User Guide Barracuda Email Security Service User Guide The Barracuda Email Security Service is a cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses,

More information

The Importance of Being Earnest [in Security Warnings]

The Importance of Being Earnest [in Security Warnings] The Importance of Being Earnest [in Security Warnings] Serge Egelman a and Stuart Schechter b a University of California, Berkeley b Microsoft Research, Redmond egelman@cs.berkeley.edu stuart.schechter@microsoft.com

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Phishing Scams Security Update Best Practices for General User

Phishing Scams Security Update Best Practices for General User Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to

More information

FROM INBOX TO ACTION EMAIL AND THREAT INTELLIGENCE:

FROM INBOX TO ACTION EMAIL AND THREAT INTELLIGENCE: WHITE PAPER EMAIL AND THREAT INTELLIGENCE: FROM INBOX TO ACTION There is danger in your email box. You know it, and so does everyone else. The term phishing is now part of our daily lexicon, and even if

More information

SPEAR PHISHING UNDERSTANDING THE THREAT

SPEAR PHISHING UNDERSTANDING THE THREAT SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business

More information

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your Overview of the Junk E-mail Filter in Outlook (Much of this text is extracted from the Outlook Help files.) Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages

More information

TMCEC CYBER SECURITY TRAINING

TMCEC CYBER SECURITY TRAINING 1 TMCEC CYBER SECURITY TRAINING Agenda What is cyber-security? Why is cyber-security important? The essential role you play. Overview cyber security threats. Best practices in dealing with those threats.

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

Phishing Victims Likely Will Suffer Identity Theft Fraud

Phishing Victims Likely Will Suffer Identity Theft Fraud Markets, A. Litan Research Note 14 May 2004 Phishing Victims Likely Will Suffer Identity Theft Fraud Fifty-seven million U.S. adults think they have received a phishing e-mail. More than 1.4 million users

More information

You ll learn about our roadmap across the Symantec email and gateway security offerings.

You ll learn about our roadmap across the Symantec email and gateway security offerings. #SymVisionEmea In this session you will hear how Symantec continues to focus our comprehensive security expertise, global intelligence and portfolio on giving organizations proactive, targeted attack protection

More information

Finding Email Security in the Cloud

Finding Email Security in the Cloud WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email

More information

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our

More information

WHITEPAPER. V12 Group www.v12groupinc.com 141 West Front Street, Suite 410 Red Bank, NJ 07701 info@v12groupinc.com 1.866.842.1001

WHITEPAPER. V12 Group www.v12groupinc.com 141 West Front Street, Suite 410 Red Bank, NJ 07701 info@v12groupinc.com 1.866.842.1001 WHITEPAPER Phishing Facts for Email Marketers: Understanding the phishing factor impact on your email programs. Email phishing attacks are destructive for everyone, it s not just the brands (and their

More information

Market Intelligence Cell. Fighting Financial Crime

Market Intelligence Cell. Fighting Financial Crime Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach

More information

Your Guide to Email Security

Your Guide to Email Security Your Guide to Email Security Protect your Information Email is a powerful way to connect with people. Unfortunately it also makes us vulnerable targets of scammers that can affect us from thousands of

More information

About the Junk E-mail Filter

About the Junk E-mail Filter 1 of 5 16/04/2007 11:28 AM Help and How-to Home > Help and How-to About the Junk E-mail Filter Applies to: Microsoft Office Outlook 2003 Hide All The Junk E-mail Filter in Outlook is turned on by default,

More information

Managing Junk Mail. About the Junk Mail Filter

Managing Junk Mail. About the Junk Mail Filter Managing Junk Mail Outlook can filter out certain types of messages and send them to a separate folder to keep your Inbox from being cluttered with junk mail. Outlook can also disable links in suspicious

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table

More information

Targeted Phishing. Trends and Solutions. The Growth and Payoff of Targeted Phishing

Targeted Phishing. Trends and Solutions. The Growth and Payoff of Targeted Phishing White Paper Targeted Phishing Email is the medium most organizations have come to rely on for communication. Unfortunately, most incoming email is unwanted or even malicious. Today s modern spam-blocking

More information

Basic Security Considerations for Email and Web Browsing

Basic Security Considerations for Email and Web Browsing Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable

More information

UW-Madison. Tips to Avoid Phishing Scams

UW-Madison. Tips to Avoid Phishing Scams UW-Madison Tips to Avoid Phishing Scams What is phishing? Phishing is the use of fraudulent email, websites, text messages and phone calls to trick people into disclosing personal financial or identity

More information

Who will win the battle - Spammers or Service Providers?

Who will win the battle - Spammers or Service Providers? Who will win the battle - Spammers or Service Providers? Pranaya Krishna. E* Spam Analyst and Digital Evidence Analyst, TATA Consultancy Services Ltd. (pranaya.enugulapally@tcs.com) Abstract Spam is abuse

More information

Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions

Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions Steve Sheng, 1 Mandy Holbrook, 1 Ponnurangam Kumaraguru, 2 Lorrie Cranor, 1 Julie Downs 1 1 Carnegie

More information

Phishing and the threat to corporate networks

Phishing and the threat to corporate networks Phishing and the threat to corporate networks A Sophos white paper August 2005 SUMMARY This paper explains the online fraud known as phishing, examining how it threatens businesses and looking at the dramatic

More information

Internet Security. For Home Users

Internet Security. For Home Users Internet Security For Home Users Basic Attacks Malware Social Engineering Password Guessing Physical Theft Improper Disposal Malware Malicious software Computer programs designed to break into and create

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Spear Phishing Attacks Why They are Successful and How to Stop Them

Spear Phishing Attacks Why They are Successful and How to Stop Them White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear

More information

Protecting your business from spam

Protecting your business from spam Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHIEF INFORMATION OFFICER October 1, 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF

More information

Online Cash Manager Security Guide

Online Cash Manager Security Guide Online Cash Manager Security Guide You re the One who can protect your business from the threat of a Corporate Account Takeover. 102 South Clinton Street Iowa City, IA 52240 1-800-247-4418 Version 1.0

More information

Awareness of Phishing under the Dutch Population

Awareness of Phishing under the Dutch Population Awareness of Phishing under the Dutch Population Bachelor thesis Supervisor: Roeland Aernoudts Student: Jakub Kulikowski Student number: 279857 December 13, 2013 Erasmus University Rotterdam Erasmus School

More information

RELATION BETWEEN TYPUS MELANCHOLICUS AND MEDICAL ACCIDENT IN JAPANESE NURSES

RELATION BETWEEN TYPUS MELANCHOLICUS AND MEDICAL ACCIDENT IN JAPANESE NURSES RELATION BETWEEN TYPUS MELANCHOLICUS AND MEDICAL ACCIDENT IN JAPANESE NURSES Yasuyuki YAMADA 1, Masataka HIROSAWA 1,2, Miyuki SUGIURA 1, Aya OKADA 1, Motoki MIZUNO 1,2 1 Department of Health and Sports

More information

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise

More information

Shouldn't They Be Getting Better At This? The Unending Spear Phishing. Joel Anderson University Information Security

Shouldn't They Be Getting Better At This? The Unending Spear Phishing. Joel Anderson University Information Security Shouldn't They Be Getting Better At This? The Unending Spear Phishing Joel Anderson University Information Security Or... Why DO Nigerian Scammers Say They are from Nigeria? First, what you already know

More information

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO E MARITIME SAFETY COMMITTEE 95th session Agenda item 4 MSC 95/4/1 5 March 2015 Original: ENGLISH MEASURES TO ENHANCE MARITIME SECURITY Industry guidelines on cyber security on board ships Submitted by

More information

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud A CHASE PAYMENTECH WHITE PAPER Expanding internationally: Strategies to combat online fraud Fraud impacts nearly eight in every ten international online retailers 1. It hampers prospects for growth, restricts

More information

2012 NORTON CYBERCRIME REPORT

2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,

More information

PART D NETWORK SERVICES

PART D NETWORK SERVICES CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC

More information

Training Employees to Recognise & Avoid Advanced Threats

Training Employees to Recognise & Avoid Advanced Threats Training Employees to Recognise & Avoid Advanced Threats Joe Ferrara, President & CEO, Wombat Security Technologies Rashmi Knowles, Chief Security Architect EMEA, RSA The Security Division of EMC Session

More information

Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS

Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS A Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS Even with today s breakthroughs in online communication, email is still one of the main ways that most

More information

Assessing the Perceptions and Usage of Substance Abuse among Teenagers in a Rural Setting

Assessing the Perceptions and Usage of Substance Abuse among Teenagers in a Rural Setting Journal of Rural Community Psychology Vol E12 No 2 Assessing the Perceptions and Usage of Substance Abuse among Teenagers in a Rural Setting Regina Fults McMurtery Jackson State University Department of

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks WHITE PAPER The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks A Cyveillance Report October 2008 EXECUTIVE SUMMARY How much do phishing attacks really cost organizations?

More information

A Pilot Study of Cyber Security and Privacy Related Behavior and Personality Traits

A Pilot Study of Cyber Security and Privacy Related Behavior and Personality Traits A Pilot Study of Cyber Security and Privacy Related Behavior and Personality Traits Tzipora Halevi James Lewis Electrical and Computer Technology Culture and Engineering Society Polytechnic Institute of

More information

Intelligence. Cognition (Van Selst) Cognition Van Selst (Kellogg Chapter 10)

Intelligence. Cognition (Van Selst) Cognition Van Selst (Kellogg Chapter 10) Intelligence Cognition (Van Selst) INTELLIGENCE What is intelligence? Mutli-component versus monolithic perspective little g (monolithic [Spearman]) [Guilford, Catell, Gardner, ] Two distinct historical

More information

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves

More information

Factors Related to Privacy Concerns and Protection Behaviors Regarding Behavioral Advertising

Factors Related to Privacy Concerns and Protection Behaviors Regarding Behavioral Advertising Factors Related to Privacy Concerns and Protection Behaviors Regarding Behavioral Advertising Donghee Yvette Wohn New Jersey Institute of Technology University Heights, GITC 5500 Newark, NJ 07102 USA wohn@njit.edu

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Safety online: anti-phishing stress test. Sustainability

Safety online: anti-phishing stress test. Sustainability Safety online: anti-phishing stress test Sustainability 2012 AGENDA FRAMEWORK METHODOLOGY RESULS ATTACHMENTS FRAMEWORK What is phishing? Phishing is based on the use of tools to collect information and

More information

North Carolina Office of the Governor North Carolina Office of Information Technology Services North Carolina Department of Cultural Resources

North Carolina Office of the Governor North Carolina Office of Information Technology Services North Carolina Department of Cultural Resources North Carolina Office of the Governor North Carolina Office of Information Technology Services North Carolina Department of Cultural Resources Best Practices for State Agency Social Media Usage in North

More information

SHS Annual Information Security Training

SHS Annual Information Security Training SHS Annual Information Security Training Information Security: What is It? The mission of the SHS Information Security Program is to Protect Valuable SHS Resources Information Security is Everyone s Responsibility

More information

PREVENTING HIGH-TECH IDENTITY THEFT

PREVENTING HIGH-TECH IDENTITY THEFT 1 PREVENTING HIGH-TECH IDENTITY THEFT Presented by The Monument Group Companies Featured speaker: David Floyd November 19, 2014 2 Introduction Preventing Identity Theft (this session) Monitoring for Theft

More information

Phishing Activity Trends Report June, 2006

Phishing Activity Trends Report June, 2006 Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account

More information

Is your data secure?

Is your data secure? You re not as safe as you think Think for a moment: Where do you keep information about your congregants or donors? In an Excel file on someone s desktop computer? An Access database housed on your laptop?

More information

Cyber Security. Maintaining Your Identity on the Net

Cyber Security. Maintaining Your Identity on the Net Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD

More information

Manual Spamfilter Version: 1.1 Date: 20-02-2014

Manual Spamfilter Version: 1.1 Date: 20-02-2014 Manual Spamfilter Version: 1.1 Date: 20-02-2014 Table of contents Introduction... 2 Quick guide... 3 Quarantine reports...3 What to do if a message is blocked inadvertently...4 What to do if a spam has

More information

Joint Plumbing Industry Board Plumbers Local Union No.1 Trust Funds

Joint Plumbing Industry Board Plumbers Local Union No.1 Trust Funds Joint Plumbing Industry Board Plumbers Local Union No.1 Trust Funds Welfare Fund Trade Education Fund Additional Security Benefit Fund 401(k) Savings Plan John J. Murphy, Co-Chairman - Labor Walter Saraceni,

More information

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

defending against advanced persistent threats: strategies for a new era of attacks agility made possible defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been

More information