{"id":4091,"date":"2019-08-23T15:30:22","date_gmt":"2019-08-23T13:30:22","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing"},"modified":"2021-08-20T08:50:16","modified_gmt":"2021-08-20T06:50:16","slug":"why-we-fall-for-phishing","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/","title":{"rendered":"Why we fall for phishing"},"content":{"rendered":"\n

When cyber\ncriminals are trying to make off with our login details, they make an effort to\nexploit the way that our brains work. <\/p>\n\n\n\n

For\ninstance, when we are feeling happy and unstressed the hormones serotonin and dopamine\ncontribute to us recognizing fraud less readily. To take advantage of this fact,\nphishing e-mails are often consciously formulated accordingly – as researchers\nat Google and the University of Florida recently explained at the Black Hat\nsecurity conference in Las Vegas, according to the German online\nedition of \u201cTechnology Review\u201d<\/a>.<\/p>\n\n\n\n

Other\nbuttons that phishers like to push, the article goes on to say, are our\nreactions to authority – think CEO fraud – or the triggering of emotions such\nas empathy, for instance in connection with catastrophes or by promising to\ngather donations for the homeless. These kinds of emotional references impair\nthe recipient\u2019s ability to concentrate on clues that the email may actually be a\nscam. Raising the prospect of financial gain, for instance through a purported\nopportunity to get a refund from Amazon, also has the power to cloud our\njudgment. <\/p>\n\n\n\n

By the way, an astounding 45 percent of internet users don\u2019t even know what phishing is, according to the Black Hat presentation. To protect users from phishing attacks, the experts incidentally recommended activating two-factor authentication (2FA) wherever possible. In addition to the password, this procedure asks users for a one-time code, which is sent to the user via SMS<\/a> or generated by an authentication app. However, the recommendation to use a physical security key on a USB medium as the most secure method leaves a rather bitter taste in the mouth, as Google – of all companies – is actually selling exactly these kinds of security keys<\/a>.<\/p>\n\n\n\n

Our recommendation for safeguarding your company inboxes is certainly our Retarus Email Security<\/a> service with its enhanced phishing filter<\/a> and dedicated CxO fraud protection<\/a>. In this way, you can ensure that the vast majority of phishing attempts don\u2019t even make it into your employees\u2019 inboxes. And should one find its way through, our Patient Zero Detection service, which is patented across Europe<\/a>, is also able to find it afterwards and render it harmless (detect and react). You can find out more details on our website or directly from your local Retarus representative<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"

When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work.<\/p>\n","protected":false},"author":14,"featured_media":4087,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","_s2mail":"","footnotes":""},"categories":[8,15],"tags":[102,24],"dipi_cpt_category":[],"class_list":["post-4091","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security","tag-email-security","tag-phishing"],"acf":[],"yoast_head":"\nWhy we fall for phishing - Retarus Corporate Blog - EN<\/title>\n<meta name=\"description\" content=\"When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work. With Retarus' Phishing Filter, you're safe from harm.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why we fall for phishing\" \/>\n<meta property=\"og:description\" content=\"When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work. With Retarus' Phishing Filter, you're safe from harm.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Retarus Corporate Blog - EN\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-23T13:30:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-20T06:50:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2019\/08\/shutterstock_1033250638.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Thomas Cloer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thomas Cloer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/\",\"name\":\"Why we fall for phishing - Retarus Corporate Blog - EN\",\"isPartOf\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2019\/08\/shutterstock_1033250638.png\",\"datePublished\":\"2019-08-23T13:30:22+00:00\",\"dateModified\":\"2021-08-20T06:50:16+00:00\",\"author\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/7f8954d8bf84d75cf384942c5f6cf2e5\"},\"description\":\"When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work. With Retarus' Phishing Filter, you're safe from harm.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/#primaryimage\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2019\/08\/shutterstock_1033250638.png\",\"contentUrl\":\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2019\/08\/shutterstock_1033250638.png\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.retarus.com\/blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why we fall for phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#website\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/\",\"name\":\"Retarus Corporate Blog - EN\",\"description\":\"Always up to date\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.retarus.com\/blog\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/7f8954d8bf84d75cf384942c5f6cf2e5\",\"name\":\"Thomas Cloer\",\"url\":\"https:\/\/www.retarus.com\/blog\/en\/author\/thomasc\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why we fall for phishing - Retarus Corporate Blog - EN","description":"When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work. With Retarus' Phishing Filter, you're safe from harm.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/","og_locale":"en_US","og_type":"article","og_title":"Why we fall for phishing","og_description":"When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work. With Retarus' Phishing Filter, you're safe from harm.","og_url":"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/","og_site_name":"Retarus Corporate Blog - EN","article_published_time":"2019-08-23T13:30:22+00:00","article_modified_time":"2021-08-20T06:50:16+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2019\/08\/shutterstock_1033250638.png","type":"image\/png"}],"author":"Thomas Cloer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Thomas Cloer","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/","url":"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/","name":"Why we fall for phishing - Retarus Corporate Blog - EN","isPartOf":{"@id":"https:\/\/www.retarus.com\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/#primaryimage"},"image":{"@id":"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2019\/08\/shutterstock_1033250638.png","datePublished":"2019-08-23T13:30:22+00:00","dateModified":"2021-08-20T06:50:16+00:00","author":{"@id":"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/7f8954d8bf84d75cf384942c5f6cf2e5"},"description":"When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work. With Retarus' Phishing Filter, you're safe from harm.","breadcrumb":{"@id":"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/#primaryimage","url":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2019\/08\/shutterstock_1033250638.png","contentUrl":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2019\/08\/shutterstock_1033250638.png","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.retarus.com\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"Why we fall for phishing"}]},{"@type":"WebSite","@id":"https:\/\/www.retarus.com\/blog\/en\/#website","url":"https:\/\/www.retarus.com\/blog\/en\/","name":"Retarus Corporate Blog - EN","description":"Always up to date","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.retarus.com\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/7f8954d8bf84d75cf384942c5f6cf2e5","name":"Thomas Cloer","url":"https:\/\/www.retarus.com\/blog\/en\/author\/thomasc\/"}]}},"_links":{"self":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/4091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/comments?post=4091"}],"version-history":[{"count":5,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/4091\/revisions"}],"predecessor-version":[{"id":4096,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/4091\/revisions\/4096"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/media\/4087"}],"wp:attachment":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/media?parent=4091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/categories?post=4091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/tags?post=4091"},{"taxonomy":"dipi_cpt_category","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/dipi_cpt_category?post=4091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}