Momentum builds as Critical Communications World d... » Critical Communications World (May 16-18, Hong Kong) is the leading and most influential congress an... New initiative shows increasing importance of CSR » A major new survey on corporate social responsibility (CSR) is now open to electrotechnical busine... OF FOOLS OF THE MIDDLE BELT, ONE NORTH AND PASTORA... » SERIES: BUHARISM AND THE FIERCE URGENCY OF NOW A treatise on pastoral jihadism, islamism, arabism a... Commvault partners with Pure Storage » Cisco Live, Melbourne, AU and Tinton Falls, NJ: Commvault has announced the integration of its Commv... OF FOOLS OF THE MIDDLE BELT, ONE NORTH AND PASTOR... » A treatise on pastoral jihadism, islamism, arabism and cultural imperialism in Nigeria (Ephesians ... Where was Aisha Buhari when idiot Kumapayi flagr... » "Clip-clip..clip-clip...Did you not hear when BABA DAURA say women's place is in the kitchen?" ... UKCloud launches Disaster Recovery to the Cloud se... » London: UKCloud has announced the launch of Disaster Recovery to the Cloud, a self-service replicati... ADG Holdings bolsters security protection with Tra... » SAN MATEO, CA : TrapX Security™ has announced that ADG Holdings, a provider of proprietary trading a... ExtraHop combines analytics and low-cost storage... » London, UK: ExtraHop has announced several major platform enhancements as part of version 6.2. These... DEFENCE MINISTER MEETS TEENAGERS TAKING PART ... » Defence Minister Earl Howe today met teenagers at the Army’s first ‘Supercamp’, a new initiative whi...

CLICK HERE TO

SOCIAL BOOKMARK

Talking Point Banner

Kaspersky Lab, this week released their analysis of the financial threat landscape in 2016 , finding that almost half of all phishing attacks registered in 2016 by Kaspersky Lab’s heuristic detection technologies were aimed at stealing their victim’s money.

 

Commenting on this, Robert Capps, VP of business development at NuData Security , said “ It’s not a surprise that phishing is still a valid concern for cyber security professionals. The Internet is awash with stolen consumer data ripe for malicious use, providing fertile soil in which fraudsters can grow innovative attacks using purloined black-market data.

“Victims of stolen data are a natural target for phishing, since most major data breaches target login credentials, email addresses and passwords. This dataset is perfect to concoct nearly flawless phishing attacks, often by impersonating major organisations or financial institutions with which they normally interact online.

“Just educating the consumer about online risks is an uphill battle, and one that inevitably finds even the savviest consumer ensnared in some fraud scheme. As such, we need to take a step back and start respecting that the average consumer can’t be expected to avoid clicking something designed specifically to lure them in and empty their accounts. Instead of blaming the victims that are unlikely to become more adept at online security, we should find ways we can do our jobs better. We need to rely less on grandma upping her security game, and more on our collective ability to innovate and invent solutions that don’t use the goodies the fraudsters are suckering folks into giving up. In fact, there are many solutions out there right now that could render most phishing attacks obsolete by devaluing any benefit the fraudsters get out of it. Let’s get on with it and stop this.”