Phony Phishing Fosters Less-Gullible UsersPhony Phishing Fosters Less-Gullible Users
Later this week in Pittsburgh, the Anti-Phishing Working Group will hold its eCrime Researchers Summit. Among the presentations will be some findings from researchers at Carnegie Mellon University, who have <a href="http://www.sciencedaily.com/releases/2007/10/071002131117.htm">used phishing tactics to educate unwary users</a> about the dangers of phishing attacks. Got that?
October 2, 2007

Later this week in Pittsburgh, the Anti-Phishing Working Group will hold its eCrime Researchers Summit. Among the presentations will be some findings from researchers at Carnegie Mellon University, who have used phishing tactics to educate unwary users about the dangers of phishing attacks. Got that?In the CMU study, "three groups of 14 volunteers participated in role-playing exercises in which they processed e-mail" that included a mix of phishing, spam, and legitimate messages. One group received phishing e-mails that directed them to an educational site about not falling for phishing e-mails.
Not only did the members of the fooled group spend more than twice as much time studying the materials on the anti-phishing site, but they were much more successful at identifying phony e-mail going forward: A week later, when the exercise was repeated, those in the "embedded training" group idenfitied 64% of phishing e-mails as bogus, versus 7% spotted by the other two groups. The findings, said Lorrie Cranor, associate research professor of computer science at Carnegie Mellon and director of the university's Usable Privacy and Security Lab, suggest that "using the tricks of phishers, perhaps in a controlled environment, might be a good first step in educating computer users to protect themselves." In other words: Once phished, twice shy.
About the Author(s)
You May Also Like
Unlocking Maximum Productivity: AI-Powered Document Redaction & GenAI Innovation
Aug 30, 2023Evolution in ITSM: Navigating the New Horizon
Sep 12, 2023Cloud Crisis Management
Aug 30, 2023[Virtual Event] DevSecOps Essentials That Enable Efficient Security
Sep 14, 2023The State of Data Security and Management: Practical Tips for Building Cyber Resilience Strategies for IT and Security Leaders
Sep 25, 2023