Defence Driven by Understanding the Attacker’s M... » LONDON, UK: MWR InfoSecurity, has confirmed details of its latest service – Countercept, a complete ... Cheshire West & Chester Council use Becrypt tVol... » London, UK: Becrypt has announced that Cheshire West & Chester Council have chosen tVolution Mini to... Secunia and Blue Cube Security announce new partne... » Secunia has signed a Value Added Reseller agreement with specialist reseller Blue Cube Security. The... Ipswitch Network and Server Performance Monitoring... » Denmark: Ipswitch Inc. has announced that its WhatsUp Gold® network and server performance monitorin... LANDESK and WinMagic partner to provide enterpri... » LONDON: LANDESK has announced it has certified and is now reselling WinMagic's suite of SecureDoc pr... How Muhammadu Buhari is camouflaging as the silent... » In the 21st century Nigeria, naivety still pervades its politics: It is shocking and embarrassing t... Enterprises signing up for more than one new cl... » LONDON: European enterprises are adding new cloud services at a rapid rate, finds a new report from ... Police to hold major exercise in central London th... » A major exercise to test the emergency services and Government response to a terrorist attack will b... Most major financial hacks completely covered u... » London, UK: Despite devastating cyber attacks being reported daily in the media, a new survey from L... What Makes Close Protection Unique? » TB Close Protection Operatives have to deal with a wide range of threats that many others who uti...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

Just about everyone with an interest in IT security knows that phishing is the practice of impersonating an official website in order to trick a user out of personal information, usually its username and password.

 

But we’ve found ourselves wondering – when do people learn about phishing?

The question was triggered by a recent spam run that turned up in the Barracuda Labs honeypots. While specifically targeting Trinity College in Connecticut, this spam is representative of email account phishing in general.

Like many organisations, Trinity College requires its computer users to change their account passwords periodically – every 120 days in this case. Email reminders are sent out and are expected. Indeed, ignoring one of these reminders can result in deactivation of your account.

We don’t have one of these reminder emails but we certainly hope that they don’t contain a clickable hyperlink. Barracuda Labs always recommends that you do not follow links in emails, regardless of how convincing they may appear. Instead, and as the college recommends, you should browse to the website of the institution and update your password there.

Ignoring our advice and clicking on the emailed link sends the browser to the phishing site, cleverly crafted to look like the college’s real login page.

A cursory examination of both the phishing site and email shows that the login page is not actually hosted on a domain owned by the college. Instead it is served by a possibly compromised website in Russia. Careful email users delete this sort of spam.

But what about 18-year old freshers who might never have been told what phishing is and how it works? For many young people, university is their first time living away from home, and although many have good, even exceptional computer skills, not all do. It’s a good bet that many college freshers know more about safe sex than safe email.

At Trinity College, a username and password gives students and faculty access to all of the computing resources that the college offers. Once such credentials are harvested by a phisher the entire network is at risk. The same is true for almost any enterprise network. Safe email has never been more important.

Account security, especially for inexperienced users, has to be something more than “choose a hard to guess password and keep it safe” buried in some employee handbook. Phishing techniques and how to spot them need to be communicated right away, ideally on the same page that includes a username and initial password. You may not run a college full of recent highschool graduates, but new users in any organisation need that sort of security training supplied prominently and pro-actively.

When do people learn about phishing? That’s hard to say, but when people should learn about phishing is every time they receive an email account.