The Seven Most Popular Subjects in Phishing Emails

Phishing has long been a crucial part of attackers’ arsenal. The technique is often deployed against companies and their employees, tricking them into clicking on the provided links and thus initiating various malicious campaigns. To counter the success of phishing, many companies have started various employee trainings to help them recognize fraudulent attempts via email, social media and on the phone.

The Psychology of Phishing

Despite the awareness and the increasing number of company trainings, people still fail to recognize phishing attempts and end up being infected. In many cases, entire enterprises suffer enormous financial losses as a result of one employee opening a phishing email and executing the malicious file attached within. In other words, knowing about phishing does not always prevent from clicking.

In a couple of experiments carried out in 2016, researchers concluded that 78% of their test subjects stated were indeed aware of the risks associated with phishing and interacting with unknown links. Only 20% from the first study and 16% of the second experiment said that they had clicked on the link. However, later researchers established that respectively 45% and 25% had clicked on the links. Did the participants lie? Researchers believe that they may have simply forgotten about the message after having clicked on it.

So, why does phishing continue to be so successful despite the awareness programs in organizations and the widely available information? The secret of success lies in the psychology of phishing… and in the subjects of these deceptive emails.

Phishing emails are becoming harder to recognize and block just because they have become very convincing. On top of that, employees don’t usually hesitate and proceed with opening the potentially malicious emails even when they are aware of the risk.

I think it’s to the point where it’s getting (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | authored by Milena Dimitrova. Read the original post at: