Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/18/2009
01:17 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Research: 88 Percent Of American Web Users Unable To Spot Phishing Sites

Respondents were asked to identify which of two Web site images presented side by side was a fraudulent phishing site, VeriSign explains

BOSTON, MA--(Marketwire - June 15, 2009) - Internet Retailer Conference & Expo, Booth #1043 - A YouGov survey* commissioned by VeriSign, Inc. (NASDAQ: VRSN) has revealed that 88 percent of Web users in the United States are at risk from online fraud because they can't identify the different forms of phishing currently happening online.

The research asked each respondent to identify which of two Web site images presented side by side was a fraudulent phishing site. The most frequently missed "tell tale" indicator was the misspelling on the site, with 88 percent failing to spot the spelling mistakes that would have identified the phishing site. The other such tell tale indicators respondents failed to spot include:

-- No padlock symbol in the browser address bar -- 68 percent duped -- URL containing unspecified, numerical, domain name -- 42 percent duped -- Unnecessary request for additional account information -- 33 percent duped

"In today's economic environment, businesses have a hard enough time competing without having to battle fraudulent, look-alike phishing sites," said Craig Spiezle, executive director of the Online Trust Alliance. "Just one phishing attack can dramatically diminish the relationship an online business has built with its customers. For these businesses, the stakes are enormous."

Phishing scams and online fraud have created doubt and concern among online shoppers. To regain their trust, site owners need an easy, reliable way to show customers that their transactions are secure -- and that they are who they say they are. Security vendors and Internet browsers have combined forces to establish the Extended Validation (EV) standard for SSL Certificates. With this technology, the browser and certificate authority control the display, making it difficult for phishers and counterfeiters to hijack a brand and its customers.

"With nine out of 10 people in the U.S. vulnerable to phishing scams, a method for easily identifying a genuine site from a phishing site is a must for all businesses online," said Tim Callan, vice president of product marketing at VeriSign. "By adopting Extended Validation, a site owner makes it easy for Web users to see that the site they are on is genuine. When a Web user visits a site secured in this way, a high-security browser will trigger the address bar to turn green. For additional clarity, the name of the organization listed in the certificate as well as the certificate's security vendor is also displayed."

"We were blown away by the impact our EV SSL Certificate had on our company; an 87 percent higher registration rate is tremendous," said Darren Shafae, founder and vice president of Paper-Check.com. "It's one thing to encrypt transmissions online, but quite another thing to assure customers that the recipient is the intended party and not an impostor. And that's just what the EV SSL green address bar signifies."

Phishing, a nationwide issue

Of the seven countries included in the research -- the United States, Germany, Sweden, Australia, India, Denmark and the United Kingdom -- the United States is the least likely to identify the tell tale signs of a phishing site that were tested for in the survey. In addition, the United States is the only country where the youngest section of the population, those between 18 and 24, is the least likely age group to identify a phishing site.

Knowledge is key to fighting phishing. To this end, VeriSign has compiled its Top five tips to distinguish a real site from a phishing site.

Consumers should check whether or not a site is genuine and whether it is taking measures to protect their personal details by looking for the following:

1. https:// in the URL: The "s" in https:// means the site is encrypted, so the information you enter is secured. While some phishing sites do have a secured Web address, many do not. Therefore, site visitors should be on the lookout for missing security on sites that should have it. 2. The padlock icon: To be meaningful, this icon must appear in the actual browser interface and not inside the content of the page itself. 3. Trust marks: Simple visual cues in the form of popular logos can show that a Web site is authenticated and secured, and that a company is reputable. 4. Check the Web address: Be suspicious of any site with an unknown domain that contains the name of a well known site in the latter part of the Web address. 5. Green address bar: Signifies that a site has undergone extensive identity authentication so that you can be confident it is the site it claims to be.

Take the Phish or No Phish Challenge yourself at www.phish-no-phish.com or visit Booth #1043 at the Internet Retailer Conference & Expo for a live demonstration.

The online survey was commissioned by VeriSign and conducted by YouGov on May 20-22, 2009. 1,015 U.S. adults (aged 18+) were polled in the sample.

About VeriSign

VeriSign, Inc. (NASDAQ: VRSN) is the trusted provider of Internet infrastructure services for the networked world. Billions of times each day, VeriSign helps companies and consumers all over the world engage in communications and commerce with confidence. Additional news and information about the company is available at www.verisign.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19619
PUBLISHED: 2019-12-06
domain/section/markdown/markdown.go in Documize before 3.5.1 mishandles untrusted Markdown content. This was addressed by adding the bluemonday HTML sanitizer to defend against XSS.
CVE-2019-19616
PUBLISHED: 2019-12-06
An Insecure Direct Object Reference (IDOR) vulnerability in the Xtivia Web Time and Expense (WebTE) interface used for Microsoft Dynamics NAV before 2017 allows an attacker to download arbitrary files by specifying arbitrary values for the recId and filename parameters of the /Home/GetAttachment fun...
CVE-2019-19617
PUBLISHED: 2019-12-06
phpMyAdmin before 4.9.2 does not escape certain Git information, related to libraries/classes/Display/GitRevision.php and libraries/classes/Footer.php.
CVE-2012-1114
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the filter parameter to cmd.php in an export and exporter_id action. and the filteruid parameter to list.php.
CVE-2012-1115
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the export, add_value_form, and dn parameters to cmd.php.