{"id":18144,"date":"2022-02-02T11:12:45","date_gmt":"2022-02-02T19:12:45","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11877\/"},"modified":"2022-02-02T11:12:45","modified_gmt":"2022-02-02T19:12:45","slug":"news-11877","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11877\/","title":{"rendered":"How a few PhD students revealed that phishing trainings might just not work: Lock and Code S03E03"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 31 Jan 2022 17:06:00 +0000<\/strong><\/p>\n<p>You&#8217;ve likely fallen for it before\u2014a simulated test sent by your own company to determine whether or not its employees are vulnerable to one of the most pernicious online threats today: Phishing. <\/p>\n<p>Phishing has evolved in recent history, and as scammers have rolled out increasingly clever\u2014and increasingly complex\u2014phishing lures, companies have had to respond with increasingly better defenses. Most employees at large companies have a phishing &#8220;reporting&#8221; button that is embedded directly into their email client, and nearly just as many employees might have a phishing email detection system integrated into their email client, so that when a &#8220;fishy&#8221; email comes through (sorry), they are warned with a small notification at the top of the email. <\/p>\n<p>But one of the primary defenses used today by countless companies is the practice called &#8220;contextual&#8221; or &#8220;embedded&#8221; training, and it&#8217;s a practice that, as we learn today on the Malwarebytes podcast Lock and Code with host David Ruiz, might not work. <\/p>\n<p>It could be a little worse than that, actually\u2014this practice could make things <em>worse<\/em>. <\/p>\n<p>That&#8217;s one interpretation coming out of a 15-month long study run by several PhD candidates at the ETH Zurich university in Switzerland. By working with a company of tens of thousands of employees, these researchers were able to test what phishing defenses actually provided the best results, and after experimenting with embedded and contextual training in a voluntary format, they learned that the phishing resilience of those test subjects actually diminished. <\/p>\n<p>Daniele Lain, who helped conduct the phishing research, told us: <\/p>\n<blockquote class=\"wp-block-quote\">\n<p>&#8220;What we saw is that, very interestingly, if you do it like this\u2014when you get training appearing when you fall for simulated emails\u2014somehow it becomes much more likely that you actually fall for the subsequent phishing attempts.&#8221;<\/p>\n<p><cite>Daniele Lain<\/cite><\/p><\/blockquote>\n<p>To say it&#8217;s a surprise is an understatement. <\/p>\n<p>Tune in to hear all this and more on this week\u2019s Lock and Code podcast by Malwarebytes Labs.<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-spotify wp-block-embed-spotify wp-embed-aspect-21-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper\"> <iframe title=\"Spotify Embed: How a few PhD students revealed that phishing trainings might just not work\" width=\"100%\" height=\"420\" style=\"\" frameborder=\"0\" allowfullscreen allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\"><\/iframe>         <\/p>\n<div class=\"col-md-8 embedded-video-alt\">\n<div class=\"embedded-video-alt-inner\">\n<div class=\"embedded-video-alt-text\">                   This video cannot be displayed because your <i>Functional Cookies<\/i> are currently disabled.<\/p>\n<p>                        To enable them, please visit our <i><a href=\"https:\/\/www.malwarebytes.com\/privacy\/#how-we-collect-information\">privacy policy<\/a><\/i> and search for the Cookies section. Select <i>&#8220;Click Here&#8221;<\/i> to open the Privacy Preference Center and select <i>&#8220;Functional Cookies&#8221;<\/i> in the menu. You can switch the tab back to <i>&#8220;Active&#8221;<\/i> or disable by moving the tab to <i>&#8220;Inactive.&#8221;<\/i> Click <i>&#8220;Save Settings.&#8221;<\/i>             <\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/figure>\n<p>You can also find us on&nbsp;<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/lock-and-code\/id1500049667\" target=\"_blank\" rel=\"noreferrer noopener\">Apple Podcasts<\/a>,&nbsp;<a href=\"https:\/\/open.spotify.com\/show\/3VB1MCXNk76TSddNNZcDuo?si=b454MPzCTYWvvS5bOPdxcA\" target=\"_blank\" rel=\"noreferrer noopener\">Spotify<\/a>, and&nbsp;<a href=\"https:\/\/podcasts.google.com\/feed\/aHR0cHM6Ly9mZWVkLnBvZGJlYW4uY29tL2xvY2thbmRjb2RlL2ZlZWQueG1s\" target=\"_blank\" rel=\"noreferrer noopener\">Google Podcasts<\/a>, plus whatever preferred podcast platform you use.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/podcast\/2022\/01\/how-a-few-phd-students-revealed-that-phishing-trainings-might-just-not-work-lock-and-code-s03e03\/\">How a few PhD students revealed that phishing trainings might just not work: Lock and Code S03E03<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/podcast\/2022\/01\/how-a-few-phd-students-revealed-that-phishing-trainings-might-just-not-work-lock-and-code-s03e03\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 31 Jan 2022 17:06:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/podcast\/2022\/01\/how-a-few-phd-students-revealed-that-phishing-trainings-might-just-not-work-lock-and-code-s03e03\/' title='How a few PhD students revealed that phishing trainings might just not work: Lock and Code S03E03'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2021\/12\/Lock-and-Code-logo-2021-scaled.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>This week on Lock and Code, with host David Ruiz, we discuss why immediate trainings for employees who fail phishing tests might not work.<\/p>\n<p>Categories: <a href=\"https:\/\/blog.malwarebytes.com\/category\/podcast\/\" rel=\"category tag\">Podcast<\/a><\/p>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/contextual-training\/\" rel=\"tag\">contextual training<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/embedded-training\/\" rel=\"tag\">embedded training<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/lock-and-code\/\" rel=\"tag\">lock and code<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/lock-and-code-podcast\/\" rel=\"tag\">lock and code podcast<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing-defenses\/\" rel=\"tag\">phishing defenses<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing-training\/\" rel=\"tag\">phishing training<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/podcast\/\" rel=\"tag\">podcast<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/podcast\/2022\/01\/how-a-few-phd-students-revealed-that-phishing-trainings-might-just-not-work-lock-and-code-s03e03\/' title='How a few PhD students revealed that phishing trainings might just not work: Lock and Code S03E03'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/podcast\/2022\/01\/how-a-few-phd-students-revealed-that-phishing-trainings-might-just-not-work-lock-and-code-s03e03\/\">How a few PhD students revealed that phishing trainings might just not work: Lock and Code S03E03<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[24759,24760,24306,24761,3924,24762,22868,5820],"class_list":["post-18144","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-contextual-training","tag-embedded-training","tag-lock-and-code","tag-lock-and-code-podcast","tag-phishing","tag-phishing-defenses","tag-phishing-training","tag-podcast"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18144"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18144\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}