{"id":4091,"date":"2019-08-23T15:30:22","date_gmt":"2019-08-23T13:30:22","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing"},"modified":"2024-05-07T20:05:10","modified_gmt":"2024-05-07T18:05:10","slug":"why-we-fall-for-phishing","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/","title":{"rendered":"Why we fall for phishing"},"content":{"rendered":"

When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work. <\/p>

For instance, when we are feeling happy and unstressed the hormones serotonin and dopamine contribute to us recognizing fraud less readily. To take advantage of this fact, phishing e-mails are often consciously formulated accordingly – as researchers at Google and the University of Florida recently explained at the Black Hat security conference in Las Vegas, according to the German online edition of \u201cTechnology Review\u201d<\/a>.<\/p>

Other buttons that phishers like to push, the article goes on to say, are our reactions to authority – think CEO fraud – or the triggering of emotions such as empathy, for instance in connection with catastrophes or by promising to gather donations for the homeless. These kinds of emotional references impair the recipient\u2019s ability to concentrate on clues that the email may actually be a scam. Raising the prospect of financial gain, for instance through a purported opportunity to get a refund from Amazon, also has the power to cloud our judgment. <\/p>

By the way, an astounding 45 percent of internet users don\u2019t even know what phishing is, according to the Black Hat presentation. To protect users from phishing attacks, the experts incidentally recommended activating two-factor authentication (2FA) wherever possible. In addition to the password, this procedure asks users for a one-time code, which is sent to the user via SMS<\/a> or generated by an authentication app. However, the recommendation to use a physical security key on a USB medium as the most secure method leaves a rather bitter taste in the mouth, as Google – of all companies – is actually selling exactly these kinds of security keys<\/a>.<\/p>

Our recommendation for safeguarding your company inboxes is certainly our Retarus Email Security<\/a> service with its enhanced phishing filter<\/a> and dedicated CxO fraud protection<\/a>. In this way, you can ensure that the vast majority of phishing attempts don\u2019t even make it into your employees\u2019 inboxes. And should one find its way through, our Patient Zero Detection service, which is patented across Europe<\/a>, is also able to find it afterwards and render it harmless (detect and react). You can find out more details on our website or directly from your local Retarus representative<\/a>. <\/p> ","protected":false},"excerpt":{"rendered":"

When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work.<\/p>\n","protected":false},"author":14,"featured_media":4087,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[8,15],"tags":[102,24],"dipi_cpt_category":[],"class_list":["post-4091","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security","tag-email-security","tag-phishing"],"acf":[],"yoast_head":"\nWhy we fall for phishing - Retarus Corporate Blog - IT<\/title>\n<meta name=\"description\" content=\"When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work. With Retarus' Phishing Filter, you're safe from harm.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why we fall for phishing\" \/>\n<meta property=\"og:description\" content=\"When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work. With Retarus' Phishing Filter, you're safe from harm.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Retarus Corporate Blog - IT\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-23T13:30:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T18:05:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2019\/08\/shutterstock_1033250638.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Thomas Cloer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thomas Cloer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/\",\"url\":\"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/\",\"name\":\"Why we fall for phishing - Retarus Corporate Blog - IT\",\"isPartOf\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2019\/08\/shutterstock_1033250638.png\",\"datePublished\":\"2019-08-23T13:30:22+00:00\",\"dateModified\":\"2024-05-07T18:05:10+00:00\",\"author\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/it\/#\/schema\/person\/7f8954d8bf84d75cf384942c5f6cf2e5\"},\"description\":\"When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work. With Retarus' Phishing Filter, you're safe from harm.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/#primaryimage\",\"url\":\"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2019\/08\/shutterstock_1033250638.png\",\"contentUrl\":\"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2019\/08\/shutterstock_1033250638.png\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.retarus.com\/blog\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why we fall for phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.retarus.com\/blog\/it\/#website\",\"url\":\"https:\/\/www.retarus.com\/blog\/it\/\",\"name\":\"Retarus Corporate Blog - IT\",\"description\":\"Sempre aggiornati\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.retarus.com\/blog\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.retarus.com\/blog\/it\/#\/schema\/person\/7f8954d8bf84d75cf384942c5f6cf2e5\",\"name\":\"Thomas Cloer\",\"url\":\"https:\/\/www.retarus.com\/blog\/it\/author\/thomasc\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why we fall for phishing - Retarus Corporate Blog - IT","description":"When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work. With Retarus' Phishing Filter, you're safe from harm.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/","og_locale":"it_IT","og_type":"article","og_title":"Why we fall for phishing","og_description":"When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work. With Retarus' Phishing Filter, you're safe from harm.","og_url":"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/","og_site_name":"Retarus Corporate Blog - IT","article_published_time":"2019-08-23T13:30:22+00:00","article_modified_time":"2024-05-07T18:05:10+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2019\/08\/shutterstock_1033250638.png","type":"image\/png"}],"author":"Thomas Cloer","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Thomas Cloer","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/","url":"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/","name":"Why we fall for phishing - Retarus Corporate Blog - IT","isPartOf":{"@id":"https:\/\/www.retarus.com\/blog\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/#primaryimage"},"image":{"@id":"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2019\/08\/shutterstock_1033250638.png","datePublished":"2019-08-23T13:30:22+00:00","dateModified":"2024-05-07T18:05:10+00:00","author":{"@id":"https:\/\/www.retarus.com\/blog\/it\/#\/schema\/person\/7f8954d8bf84d75cf384942c5f6cf2e5"},"description":"When cyber criminals are trying to make off with our login details, they make an effort to exploit the way that our brains work. With Retarus' Phishing Filter, you're safe from harm.","breadcrumb":{"@id":"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/#primaryimage","url":"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2019\/08\/shutterstock_1033250638.png","contentUrl":"https:\/\/www.retarus.com\/blog\/it\/wp-content\/uploads\/sites\/27\/2019\/08\/shutterstock_1033250638.png","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.retarus.com\/blog\/it\/why-we-fall-for-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.retarus.com\/blog\/it\/"},{"@type":"ListItem","position":2,"name":"Why we fall for phishing"}]},{"@type":"WebSite","@id":"https:\/\/www.retarus.com\/blog\/it\/#website","url":"https:\/\/www.retarus.com\/blog\/it\/","name":"Retarus Corporate Blog - IT","description":"Sempre aggiornati","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.retarus.com\/blog\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.retarus.com\/blog\/it\/#\/schema\/person\/7f8954d8bf84d75cf384942c5f6cf2e5","name":"Thomas Cloer","url":"https:\/\/www.retarus.com\/blog\/it\/author\/thomasc\/"}]}},"_links":{"self":[{"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/posts\/4091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/comments?post=4091"}],"version-history":[{"count":6,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/posts\/4091\/revisions"}],"predecessor-version":[{"id":8880,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/posts\/4091\/revisions\/8880"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/media\/4087"}],"wp:attachment":[{"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/media?parent=4091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/categories?post=4091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/tags?post=4091"},{"taxonomy":"dipi_cpt_category","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/it\/wp-json\/wp\/v2\/dipi_cpt_category?post=4091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}