Africa > Africa: How to Avoid Getting Hooked By a Festive Season Phishing Scam

Africa: Africa: How to Avoid Getting Hooked By a Festive Season Phishing Scam

2015/12/15

Email phishing attacks are particularly popular over the festive season, half because there's an increase in email marketing and appropriate offers linked to the holidays.

During the fourth quarter of 2014, for instance, the number of incomparable phishing attacks globally went up by 18% compared with the third quarter that year, according to the Anti-Phishing Working Group.

A total of 437 brands were targeted and 46,824 incomparable phishing websites were reported, the majority of them hosted in the US. The majority-targeted industries for phishing attacks are retail/service, financial services and payment services.

It seems that during the Christmas period people are probably additional likely to respond to these offers. They as well appear willing to spend additional money than usual. This creates a perfect opportunity for cyber criminals to hook their bait.

But what is phishing and why does it happen? And how can people guard against it?

Identity theft

To begin with, it's significant to understand the practice that lies at the heart of phishing: identity theft. This is a form of fraud in which one person pretends to be someone else to illegitimately benefit at the victim's expense.

Cyber criminals usually acquire the data that they need by stealing a wallet, going through mail, or dumpster diving. They as well target organisations that are in possession of sensitive private data by stealing IDs, back-ups or documentation.

In the US in 2014 there was one new victim of identity theft each two seconds.

In South Africa, identity theft losses all to additional than R1 billion annually according to the Southern African Fraud Prevention Services. In 2014, 3600 cases were reported and it believes that additional than 4000 cases would be reported by the end of 2015.

In the anonymous world of the internet, individuals are uniquely identified by account numbers and passwords which form the basis of online authentication.

Online identity theft happens at the same time as a victim's online identity is stolen by cyber criminals and used for unauthorised purposes that cause financial losses to the victim. Email phishing attacks are an increasingly popular and sophisticated method that cyber criminals employ to get the data they require to commit online identity theft.

Phishing

Phishing is an online identity theft method in which spoofed emails are sent out to lure recipients through embedded hyperlinks to fraudulent websites. Here, cyber criminals attempt to trick online users into divulging personal financial data like passwords and account numbers.

Initially phishing emails and the associated bogus websites where mostly masked as coming from financial services institutions. These were easily identifiable because of poor language and grammar or non-authentic looking copies of websites.

But this is no longer the case. As users grew additional sophisticated, so too did cyber criminals. In recent years they have begun targeting a wider set of industries, using additional authentic looking emails and websites.

A possible solution?

Well-planned phishing websites fool additional than 90% of respondents, while 23% do not notice browser-based security warnings and indicators and 15% ignore these warnings, according to a Harvard University study. Researchers found no correlation between victims' vulnerability and their gender, age, education levels or computer experience.

Keeping yourself abreast of phishing trends is useful. Research recommends these anti-phishing measures as initial steps to protect your online privacy:

be cautious with emails and confidential data;

look for indications that browsers and websites are fasten and legitimate;

employ available security measures; and

keep in mind that at the same time as an offer appears too good to be authentic, it probably is.

We are doing new research to find out how people view the threat of phishing and what steps they take to avoid phishing. The data will help us find ways to improve online security.

Whether you think you're vulnerable to phishing, believe you're well protected or genuinely have no idea, you can contribute to this research by clicking here to complete the survey.

Disclosure statement

The authors do not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond the academic appointment above.

Related Articles
  • South Africa to extend ICT reach

    2016/06/19 While the expansion of mobile broadband and fibre-optic networks are driving increase of ICT services in South Africa, additional infrastructure investment will be needed to keep pace with rapidly rising market request. Focus on speed South Africa has a set of ambitious targets laid out in its national broadband policy, South Africa Connect, which includes achieving 50% internet coverage with speeds of 5 Mbps by 2016; roughly 90% coverage at the same speeds by 2020; 50% coverage with speeds of 100 Mbps by 2020; and universal 100-Mbps coverage by 2030.
  • Kenya’s tea industry moves toward strategic diversification

    2016/06/19 Reducing a reliance on bulk black tea is a key objective for Kenya as it looks to boost revenue from one of its flagship agricultural sectors. Kenya is the world’s leading exporter of black tea, which accounts for 95% of the country’s in general tea production, making it one of its major agricultural exports. Tea exports generated earnings of KSh125.3bn ($1.23bn) in 2015, a 23% increase from the previous year. The jump in revenue was the result of higher prices due in large part to a weaker harvest, with 2015 crop yields at 399.2m kg, a 10% year-on-year decrease, according to data from the Agriculture, Fisheries and Food Authority (AFFA). Prospects for 2016 are somewhat additional muted, with overseas tea sales predicted to generate between KSh115bn ($1.14bn) and KSh120bn ($1.19bn).
  • Ghana steps up to secure electricity supply

    2016/06/19 The start of new gas production in Ghana has significantly improved the prospects for long-term increase in the country, although efforts to exploit domestic reserves for local power generation faced a minor setback before this year. While Ghana’s hydrocarbons sector has seen relatively stable output over the initial few months of 2016, a two-week period of inspection and maintenance work on the Kwame Nkrumah, a floating production, storage and offloading (FPSO) vessel, led to a temporary drop in gas supply to the power sector. The shutdown slowed gas supply to the Volta River Authority’s (VRA) thermal generating facilities in Aboadze, reducing output by 250 MW, according to local media.
  • Tunisia augments ICT exports and connectivity

    2016/06/19 A strategic five-year plan targeting Tunisia’s ICT sector, Tunisie Digitale 2020, looks to dramatically increase the industry’s contribution to employment and revenues. First launched in 2014 as Tunisie Digitale 2018, the plan was revised last year to harmonise its timelines and objectives with the government’s new five-year general economic development plan for the 2016-20 period. The plan aims to create 100,000 jobs and double the GDP of the country’s digital economy to TD9bn (€4.1bn) by 2020. Sector exports, meanwhile, are expected to increase four-fold between 2014 and 2020 to TD4bn (€1.7bn).
  • Djibouti takes steps to overhaul banking sector

    2016/06/19 Djibouti’s banking regulator has unveiled a series of reforms that seek to improve the efficiency and health of the country’s lenders, and expand sharia-compliant financial services. The regulatory overhaul, which is set to be rolled out this year, includes plans to improve operational efficiency and set up a new credit data system to help banks manage credit risk. The measures are in line with a raft of reforms introduced by the Central Bank of Djibouti (Banque Centrale de Djibouti, BCD) in recent years aimed at strengthening the position of local lenders and increasing transparency.