{"id":8723,"date":"2021-11-02T12:50:13","date_gmt":"2021-11-02T12:50:13","guid":{"rendered":"http:\/\/TheNextWeb=1371881"},"modified":"2021-11-02T12:50:13","modified_gmt":"2021-11-02T12:50:13","slug":"youre-just-as-good-as-a-cybersecurity-expert-at-spotting-a-phishing-email","status":"publish","type":"post","link":"https:\/\/www.londonchiropracter.com\/?p=8723","title":{"rendered":"You\u2019re just as good as a cybersecurity expert at spotting a phishing email"},"content":{"rendered":"\n<p>An employee at <a href=\"https:\/\/www.cbc.ca\/news\/canada\/edmonton\/macewan-university-phishing-scam-edmonton-1.4270689\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">MacEwan University got an email<\/a> in 2017 from someone claiming to be a construction contractor asking to change the account number where almost $12 million in payments were sent. A week later the actual contractor called asking when the payment would arrive. The email about the account number change was fake. Instead of going to the contractor, the payments were sent to accounts controlled by criminals.<\/p>\n<p>Fake emails that try to get people to do things they wouldn\u2019t normally do, such as send money, <a href=\"https:\/\/www.wsj.com\/articles\/how-a-u-s-utility-got-hacked-1483120856\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">run dangerous programs<\/a> or <a href=\"https:\/\/www.nytimes.com\/2016\/12\/13\/us\/politics\/russia-hack-election-dnc.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">give out passwords<\/a>, are known as <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">phishing<\/a> emails. Cybersecurity experts often <a href=\"https:\/\/doi.org\/10.1177%2F0269758015571471\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">blame the people<\/a> who receive such messages for not noticing that the emails are fake.<\/p>\n<p>As a <a href=\"https:\/\/scholar.google.com\/citations?user=ef0ApTwAAAAJ&amp;hl=en\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">cybersecurity researcher<\/a>, I\u2019ve found that most <a href=\"https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/wash\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">people are good at almost all of the skills<\/a> that computer security experts use to notice fake emails in their inboxes. Making up the difference comes down to listening to your instincts.<\/p>\n<h2>How the pros do it<\/h2>\n<p>In earlier research, I found that when cybersecurity experts <a href=\"https:\/\/doi.org\/10.1145\/3415231\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">received a phishing email message<\/a>, they, like most people, assumed the email was real. They initially took everything in the email at face value. They tried to figure out what the email was asking them to do, and how it related to things in their life.<\/p>\n<p>As they read, they noticed small things that seemed off, or different from what would typically be in similar email messages. They noticed things like typos in a professional email, or the lack of typos from a busy executive. They noticed things like a bank providing account information in an email message instead of the standard notification that the recipient had a message waiting for them in the bank\u2019s secure messaging system. They also noticed things like someone uncharacteristically emailing them without mentioning it in person first.<\/p>\n<p>But noticing these signs isn\u2019t enough to figure out the email is a fraud. Instead, the experts just became uncomfortable with the email message. It wasn\u2019t until they saw something in the message that reminded them of phishing that they became suspicious. They would see an anomaly like a link that the email was trying to get them to click. In their minds, these are commonly associated with phishing emails.<\/p>\n<p>Combined with the uncomfortable feeling about the email message, this reminder prompted the experts to recognize that phishing might explain the weird things they noticed. They became suspicious of the message and investigated to figure out if it was a fraud.<\/p>\n<h2>Good instincts<\/h2>\n<p>If that\u2019s how experts do it, then what do regular people do? When I interviewed people without computer security experience, I found <a href=\"https:\/\/www.ieee-security.org\/TC\/SPW2021\/ConPro\/papers\/nthala-conpro21.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">a similar process<\/a>. Most people noticed things that seemed off, became uncomfortable with the email, remembered about phishing and investigated.<\/p>\n<p>My research found that people are good at the first two steps: noticing things in the email that seem weird, and becoming uncomfortable. Almost everyone I talked to noticed multiple problems when they saw a fake email, and told me about feeling uncomfortable with the message.<\/p>\n<figure class=\"align-center zoomable\">\n<figure class=\"post-image post-mediaBleed aligncenter\"><a href=\"https:\/\/images.theconversation.com\/files\/429191\/original\/file-20211028-23-ttwp60.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.theconversation.com\/files\/429191\/original\/file-20211028-23-ttwp60.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" alt=\"screenshot of an email message with overlaid annotations\" width=\"600\" height=\"499\" class=\"js-lazy\" data-srcset=\"https:\/\/images.theconversation.com\/files\/429191\/original\/file-20211028-23-ttwp60.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=499&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/429191\/original\/file-20211028-23-ttwp60.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=499&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/429191\/original\/file-20211028-23-ttwp60.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=499&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/429191\/original\/file-20211028-23-ttwp60.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=627&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/429191\/original\/file-20211028-23-ttwp60.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=627&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/429191\/original\/file-20211028-23-ttwp60.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=627&amp;fit=crop&amp;dpr=3 2262w\"><noscript><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.theconversation.com\/files\/429191\/original\/file-20211028-23-ttwp60.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" alt=\"screenshot of an email message with overlaid annotations\" width=\"600\" height=\"499\" class srcset=\"https:\/\/images.theconversation.com\/files\/429191\/original\/file-20211028-23-ttwp60.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=499&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/429191\/original\/file-20211028-23-ttwp60.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=499&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/429191\/original\/file-20211028-23-ttwp60.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=499&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/429191\/original\/file-20211028-23-ttwp60.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=627&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/429191\/original\/file-20211028-23-ttwp60.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=627&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/429191\/original\/file-20211028-23-ttwp60.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=627&amp;fit=crop&amp;dpr=3 2262w\"><\/noscript><\/a><figcaption><a href=\"https:\/\/thenextweb.com\/news\/youre-just-as-good-as-cybersecurity-expert-at-spotting-phishing-email-syndication#\" data-url=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Feditorial.thenextweb.com%2Fsecurity%2F2021%2F11%2F02%2Fyoure-just-as-good-as-cybersecurity-expert-at-spotting-phishing-email-syndication%2F&amp;via=thenextweb&amp;related=thenextweb&amp;text=Check out this picture on: Aspects of an email message that seem off should prompt you to consider the possibility of phishing. The trick is remembering that phishing exists. Image via Rick Wash, CC BY-ND\" data-title=\"Share Aspects of an email message that seem off should prompt you to consider the possibility of phishing. The trick is remembering that phishing exists. Image via Rick Wash, CC BY-ND on Twitter\" data-width=\"685\" data-height=\"500\" class=\"post-image-share popitup\" title=\"Share Aspects of an email message that seem off should prompt you to consider the possibility of phishing. The trick is remembering that phishing exists. Image via Rick Wash, CC BY-ND on Twitter\"><i class=\"icon icon--inline icon--twitter--dark\"><\/i><\/a>Aspects of an email message that seem off should prompt you to consider the possibility of phishing. The trick is remembering that phishing exists. Image via Rick Wash, CC BY-ND<\/figcaption><\/figure>\n<\/figure>\n<p>And if people thought about phishing, they were also good at investigating. Instead of looking at technical details, though, most people either contacted the sender or asked others for help. But they were still able to correctly figure out whether an email message was a phishing attack.<\/p>\n<h2>Phishing stories<\/h2>\n<p>Most phishing training teaches people to look for problems in email. But for most people, the hard part about phishing isn\u2019t noticing the weird things in an email message. People often deal with weird but real emails. Many messages feel a little bit off. Sometimes your boss is having a bad day, or the bank changes its polices. No email message is perfect, and people are often attuned to that.<\/p>\n<p>The challenge for most people was remembering that phishing exists, and recognizing that phishing might explain those weird things. Without that awareness of phishing, the weirdness in phishing messages can be lost in everyday email weirdness.<\/p>\n<p>Most people I interviewed know about phishing in general. But the people who were good at noticing phishing messages reported stories about specific phishing incidents they had heard about. They told me about a time when someone at their organization fell for a phishing email, or about a news story of an incident like the one at MacEwan University.<\/p>\n<p>Familiarity with specific phishing incidents helps people remember phishing generally and recognize that it might explain the weird things they notice in an email. These stories are key to people going from \u201csomething\u2019s fishy\u201d to \u201cis this phishing?\u201d<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/counter.theconversation.com\/content\/169804\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" class=\"js-lazy\"><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><noscript><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/counter.theconversation.com\/content\/169804\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" class><\/noscript><\/p>\n<p><em>This article by <a href=\"https:\/\/theconversation.com\/profiles\/rick-wash-1266664\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Rick Wash<\/a>, Associate Professor of Information Science and Cybersecurity, <a href=\"https:\/\/theconversation.com\/institutions\/michigan-state-university-1349\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Michigan State University<\/a>, is republished from <a href=\"https:\/\/theconversation.com\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/you-know-how-to-identify-phishing-emails-a-cybersecurity-researcher-explains-how-to-trust-your-instincts-to-foil-the-attacks-169804\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">original article<\/a>.<\/em><\/p>\n<p> <a href=\"https:\/\/thenextweb.com\/news\/youre-just-as-good-as-cybersecurity-expert-at-spotting-phishing-email-syndication\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An employee at MacEwan University got an email in 2017 from someone claiming to be a construction contractor asking to change the account number where almost $12 million in payments were sent&#8230;.<\/p>\n","protected":false},"author":1,"featured_media":8724,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/8723"}],"collection":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8723"}],"version-history":[{"count":0,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/8723\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/media\/8724"}],"wp:attachment":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}