The more you train people to be eternally vigilant the less susceptible they are to the attacks of the amateurs, leaving them with false confidence that makes them easier targets for the really skilled spear phishers,” says the writings of one I would consider a technological guru.
Phishing is done when contact is made via email (mostly) or even social media to a number of persons or organisations which is intended to gather personal and senisitve information of those people. The aim is that the information will then be used for either fraudulent account creation or reuse against the individual victims where their bankc accounts etc will be accessed fraudulently.
There is now a newer and more sophisticated type f phishing known as spear-phishing. This is targeted at a specific individual or organisation and takes a little more tact and skill to be executed. Its major strength is in how well articulated it would be in line with the victim[‘s personal relevant information so that whatever is contained in the email to them will resonate with them and the email sender deemed legit.
What most internet security gurus seem to agree on is that spear-phishing is getting more and more sophisticated and no traditional means of iternet security can eradicate this practice. What many of them would lie about -though-is that there is a way for you to avoid spear-phishing. That is a myth with the current trends of spear phishers.
That brings me back to the opening line of this article. When you train people to be more diligent in how well they protect themselves against sttackers, you give them an edge against those novice attackers and these small record successes will make them feel they can scale it all on the internet, leaving them open to real attacks from real phishing professionals.
How then can the internet community be spared from this malicious and sophisticated movement? Part of the prerogative of the powers that be on the internet is to ensure that personal identification is enabled across the internet so that every person has a peculiar identity with which they can be held accountable for their various activities on the internet.
E-mail origins and various communication links can all be filtered out based on individualised key protocols with which owners can then be identified. Perhaps it does look like there might actually be a tentative solution to phishing challenges after all?
“I am blogging as an Individual Member of The Authenticity Alliance, and I frequently blog on behalf of other Alliance members.”