Semafone wins new US contracts totalling $7.5 mi... » Guildford, UK: Semafone has reported three new client wins in North America worth $7.5 million, only... BeyondTrust announces key partnership with Simei... » PHOENIX: BeyondTrust has announced a strategic partnership with Simeio Solutions. As BeyondTrust inc... Motorola Solutions acquires Next-Generation C... » ● New communications platform to be offered as a service ● Motorola Solutions extends... Thales releases advanced encryption solutions fo... » Thales has announced the release of new capabilities for its leading Vormetric Data Security Platfor... 4G mobile calls still open to eavesdroppers » London: Armour Communications has explained in a paper just published entitled, Is someone listening... Covata wins Internet of Security (IoT) Solution ... » Sydney, Australia: Covata Limited has been awarded the IoT Security Solution Award at the 2016 Compu... Security & Counter Terror Expo announces new milit... » New workshop expected to welcome hundreds of military and homeland security professionals The mil... Gallagher releases latest mobile security technolo... » Hamilton, NZ: Vigilance can report that Gallagher has announced the global release of its latest sta... LOCKEN rolls out smart access control solution » LOCKEN has just transformed the access security of electrical power stations throughout the large ... SpeedCast introduces SIGMA Net » Sydney, Australia: SpeedCast International Limited has announced the official release of SIGMA Net, ...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

Just about everyone with an interest in IT security knows that phishing is the practice of impersonating an official website in order to trick a user out of personal information, usually its username and password.

 

But we’ve found ourselves wondering – when do people learn about phishing?

The question was triggered by a recent spam run that turned up in the Barracuda Labs honeypots. While specifically targeting Trinity College in Connecticut, this spam is representative of email account phishing in general.

Like many organisations, Trinity College requires its computer users to change their account passwords periodically – every 120 days in this case. Email reminders are sent out and are expected. Indeed, ignoring one of these reminders can result in deactivation of your account.

We don’t have one of these reminder emails but we certainly hope that they don’t contain a clickable hyperlink. Barracuda Labs always recommends that you do not follow links in emails, regardless of how convincing they may appear. Instead, and as the college recommends, you should browse to the website of the institution and update your password there.

Ignoring our advice and clicking on the emailed link sends the browser to the phishing site, cleverly crafted to look like the college’s real login page.

A cursory examination of both the phishing site and email shows that the login page is not actually hosted on a domain owned by the college. Instead it is served by a possibly compromised website in Russia. Careful email users delete this sort of spam.

But what about 18-year old freshers who might never have been told what phishing is and how it works? For many young people, university is their first time living away from home, and although many have good, even exceptional computer skills, not all do. It’s a good bet that many college freshers know more about safe sex than safe email.

At Trinity College, a username and password gives students and faculty access to all of the computing resources that the college offers. Once such credentials are harvested by a phisher the entire network is at risk. The same is true for almost any enterprise network. Safe email has never been more important.

Account security, especially for inexperienced users, has to be something more than “choose a hard to guess password and keep it safe” buried in some employee handbook. Phishing techniques and how to spot them need to be communicated right away, ideally on the same page that includes a username and initial password. You may not run a college full of recent highschool graduates, but new users in any organisation need that sort of security training supplied prominently and pro-actively.

When do people learn about phishing? That’s hard to say, but when people should learn about phishing is every time they receive an email account.