SHARE
Facebook X Pinterest WhatsApp

Spearphishing Quiz Quickly Demonstrates Danger

Risk Management: A Look Back at 2013 and Ahead to 2014 When McAfee presented a 10-question quiz on identifying legitimate vs. phishing email messages at this year’s RSA Conference, the firm found that the average accuracy rate for quiz takers was a “C.” It was just another reminder of how difficult fending off spearphishing efforts […]

Written By
thumbnail
Kachina Shaw
Kachina Shaw
May 15, 2014
Slide Show

Risk Management: A Look Back at 2013 and Ahead to 2014

When McAfee presented a 10-question quiz on identifying legitimate vs. phishing email messages at this year’s RSA Conference, the firm found that the average accuracy rate for quiz takers was a “C.” It was just another reminder of how difficult fending off spearphishing efforts in the enterprise can be, for both IT and end users. And that’s exactly why phishers keep using the strategy. All they have to do is study their target’s legitimate communications, make their copies, and start distributing them to their selected recipients.

Go ahead and take the test. How did you do? While I did get a score of 90, marking one spearphishing mail as legitimate, I learned quite a bit from McAfee’s explanations of how I could examine that mail more effectively. In this case, it was a mail displayed on a mobile device, and the advice to long-press URLs to display them and check that they are legitimate, for example, will come in handy.

Dave Bull, director, Product Marketing at McAfee, a part of Intel Security, explained in an email message:

“Employees around the world, no matter what industry, are subjected to phishing attacks on a regular basis. The increase in sophistication and targeting of these attacks makes them extremely difficult to detect. We want to help businesses and their employees improve their skill in detecting phishing attacks, which is why we created this quiz. We’ve also built technology that is proven to detect the most advanced malware used in targeted phishing. Through both education and technology, we can build a stronger defense against the most effective entry point for cyber criminals today.”

Giving end users a quick exercise, such as this quiz, to open communication about how to identify phishing attempts, encourages more questions and, one hopes, fewer risks of breaches. McAfee also provides this list of seven tips to avoid being phished (click through for more detail on each):

  1. Keep your email, web, and endpoint security up to date.
  2. Even trusted email senders can be compromised.
  3. Colleagues may innocently send infected links or files to download.
  4. Just because an email looks good doesn’t mean it’s legitimate.
  5. While some email addresses are obviously from a phony third-party site, it’s easy for sophisticated scammers to make an email address look similar to a legitimate domain.
  6. Like email addresses, creating fairly convincing URLs is easy for sophisticated scammers.
  7. Your safest choice is to always stay in the driver’s seat by finding content yourself.

You can also refer to this IT Business Edge five-step phishing ID checklist, which goes into detail on how to tell where phishers are getting some of their information.

Recommended for you...

How DeFi is Reshaping the Future of Finance
Kihara Kimachia
Aug 25, 2022
Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.