• About
  • Advertise
  • Careers
  • Contact
Saturday, March 25, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security

99% Email Attacks Require Human Interaction: Security Researchers

by Cyber360 News
November 11, 2019
in Security
0
99% Email Attacks Require Human Interaction: Security Researchers
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter

Email-based cyber attacks have become common these days. I am not the only one receiving emails saying that the file in the attachment contains data that I might be interested in knowing. Social engineering has become one of the major tools attackers use to lure targets into opening links or attachments.

A report by Proofpoint titled “The Human Factor 2019 Report” analyzes how email attacks rely on human interaction rather than automated exploits. Based on data obtained by screening 1 billion messages per day over 18 months, the report concludes that more than 99% of the attacks require human interaction to succeed.

jamf now

Persuasive social engineering makes it difficult to distinguish a fraud email from a genuine one. Most attacks structure an email in a manner that it looks like they have received from a trusted source like Google, Microsoft, or a known contact.

The report also mentions that hackers tend to imitate the business routines of organizations to fool employees working there.

Other key conclusions found in the report include:

  • People who are frequently targeted by fraud emails are, usually, not high-profile individuals or VIPs. These are discovered identities or “targets of opportunities” for attackers.
  • Domain fraud — registering a domain name that looks similar to popular brands to trick users — lends a sense of legitimacy to a socially engineered fraud email.
  • Social engineering is extensively used in credential phishing, sextortion scams, and business email compromise (BEC).

While malicious actors prepare email attacks in a way that makes it difficult to distinguish a spam mail from a genuine one. However, you can identify a potentially malicious mail by checking its domain name. You should also avoid clicking on unknown links and more.

Have you witnessed and escaped an email attack? Tell us in the comments.

Also Read: Almost Every US State Is Launching ‘Anti-Trust Probe’ Against Google
Cyber360 News

Cyber360 News

Next Post
How To Access Blocked Sites To Unblock Banned Webpages?

How To Access Blocked Sites To Unblock Banned Webpages?

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In