{"id":4091,"date":"2019-08-23T15:30:22","date_gmt":"2019-08-23T13:30:22","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing"},"modified":"2021-08-20T08:50:16","modified_gmt":"2021-08-20T06:50:16","slug":"why-we-fall-for-phishing","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/en\/why-we-fall-for-phishing\/","title":{"rendered":"Why we fall for phishing"},"content":{"rendered":"\n
When cyber\ncriminals are trying to make off with our login details, they make an effort to\nexploit the way that our brains work. <\/p>\n\n\n\n
For\ninstance, when we are feeling happy and unstressed the hormones serotonin and dopamine\ncontribute to us recognizing fraud less readily. To take advantage of this fact,\nphishing e-mails are often consciously formulated accordingly – as researchers\nat Google and the University of Florida recently explained at the Black Hat\nsecurity conference in Las Vegas, according to the German online\nedition of \u201cTechnology Review\u201d<\/a>.<\/p>\n\n\n\n Other\nbuttons that phishers like to push, the article goes on to say, are our\nreactions to authority – think CEO fraud – or the triggering of emotions such\nas empathy, for instance in connection with catastrophes or by promising to\ngather donations for the homeless. These kinds of emotional references impair\nthe recipient\u2019s ability to concentrate on clues that the email may actually be a\nscam. Raising the prospect of financial gain, for instance through a purported\nopportunity to get a refund from Amazon, also has the power to cloud our\njudgment. <\/p>\n\n\n\n By the way, an astounding 45 percent of internet users don\u2019t even know what phishing is, according to the Black Hat presentation. To protect users from phishing attacks, the experts incidentally recommended activating two-factor authentication (2FA) wherever possible. In addition to the password, this procedure asks users for a one-time code, which is sent to the user via SMS<\/a> or generated by an authentication app. However, the recommendation to use a physical security key on a USB medium as the most secure method leaves a rather bitter taste in the mouth, as Google – of all companies – is actually selling exactly these kinds of security keys<\/a>.<\/p>\n\n\n\n Our recommendation for safeguarding your company inboxes is certainly our Retarus Email Security<\/a> service with its enhanced phishing filter<\/a> and dedicated CxO fraud protection<\/a>. In this way, you can ensure that the vast majority of phishing attempts don\u2019t even make it into your employees\u2019 inboxes. And should one find its way through, our Patient Zero Detection service, which is patented across Europe<\/a>, is also able to find it afterwards and render it harmless (detect and react). You can find out more details on our website or directly from your local Retarus representative<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":" When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work.<\/p>\n","protected":false},"author":14,"featured_media":4087,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","_s2mail":"","footnotes":""},"categories":[8,15],"tags":[102,24],"dipi_cpt_category":[],"class_list":["post-4091","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security","tag-email-security","tag-phishing"],"acf":[],"yoast_head":"\n