Datamation Logo

Can You Spot The Phish Attack?

November 28, 2005
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

Knowing the difference between a legitimate e-mail and a scammed phishing e-mail is not always as easy as one would think.

According to data from e-mail security firm MailFrontier, only 4 percent of users can spot a phished e-mail 100 percent of the time. That’s a very sobering thought as the holiday season is upon us and Americans flock online for their shopping needs.

MailFrontier’s data comes from its Phishing IQ Test, which is comprised of 10 examples of e-mails and users must choose whether they think the mail is legitimate, a fraud or if they have no answer.

The example e-mails are from Chase, PayPal, Bank of America, Washington Mutual, MSN, EarthLink and Amazon.

The average score in 2005, according to MailFrontier, is 75 percent, which is up from 61 percent in 2004.

Andrew Klein, manager with the MailFrontier Threat Center, noted that improvement in test takers’ ability to spot a phishing attempt occurred over time.

“We believe this is the result of people becoming more aware of phishing in general,” Klein told internetnews.com. “They got more suspicious.”

One of the surprising results of the survey, according to Klein, is that younger people (18-24) are more likely than older people (55+) to be fooled by a phishing attack.

MailFrontier said there are five main myths surrounding phishing.

The first myth is that users can actually detect a phishing attack. Though they are getting better at identifying phishing attacks, Klein argues that there is still a good chance someone will consider a phishing e-mail to actually be legitimate.

The second myth is that spam filters can detect and stop phishing attacks.

“By now most people agree that spam and phishing e-mail are different, with phishing e-mail designed to look like legitimate transactional e-mail a user would expect to receive,” Klein noted. “To catch a phish, a different set of evaluation criteria is required to help distinguish the legitimate from the phishing e-mail.”

This article was first published on EarthwebNews.com. To read the full article, click here.

  SEE ALL
ARTICLES
 

Subscribe to Data Insider

Learn the latest news and best practices about data science, big data analytics, artificial intelligence, data security, and more.

Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Advertisers

Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.

Advertise with Us

Our Brands


Privacy Policy Terms & Conditions About Contact Advertise California - Do Not Sell My Information

Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.