PHISHING OVERVIEW 2015

Updated: 02/01/2016 14:41
Reprints/Permissions  Hyip Monitor
phishing overview 2015
See the summary of phishing attacks for the year 2015, notification of the most dangerous applications and software, phishing identification overview
Sponsored Links
See the summary of phishing attacks for the year 2015, notification of the most dangerous applications and software, phishing identification overview

Summarizing the results of the year 2015, the extent of cyber fraud in terms of phishing grew by 14% compared to the result of the year 2014. The readings of the target phishing fraud aimed at obtaining information about particular person increased by 22%. The new investigation held by the security technologies provider Wombat speaks of that. The document also says, last year fraudsters were using more complex ways of taking the confidential information from customers, using effectively the methods of social engineering. More complex methods taken by the criminals block preventing the payment information and other personal data leakage to the fraudsters hands.

Phishing is a kind of online cryme, the aim of which is getting access to customers' confidential information - logins and passwords. Fraudsters achieve their goals by means of mass mailings on behalf of online authority, which should potentially look trustworthy, the letters normally contain requests to enter the personal data.

Respondents informed, due to successful phishing attacks they suffered from malicious programs (42%), accounts being hacked (22%) and data loss (4%). Apart from that production glitches and uncontrolled compromise of classified information can lead to serious losses in the order of companies. Last year all businesses in total lost around $3.7 mln due to phishing attacks.

Phishing messages more often come to victims' PCs via e-mail. Despite using various spam identification techniques these messages are still being opened by users. More often the messages aimed to steal confidential information find addressee in telecommunication industry and the sphere of professional services.

Addressing recipients by name improve the chances for the e-mail to be opened by 19%. The most dangerous applications to the e-mails are as follows: PDF (29% ), DOC (22%), HTML (13%) и XLS (12%). Such programs as Adobe (61%), Adobe Flash (46%), Microsoft Silverlight (27%) ans Java (25%) can be the most threatened.


About the author

Brett Sherpan has been working for seven years writing and editing for online and print media. He has held various editing and copywriting positions and can quickly and competently write copy for sales, marketing and editorial content. Brett is a consistently dependable team player, who thrives in a high-pressure environment, enjoying the challenges of meeting deadlines and am comfortable researching, writing and editing on a wide range of topics
You May Also Like