Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/18/2009
01:17 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Research: 88 Percent Of American Web Users Unable To Spot Phishing Sites

Respondents were asked to identify which of two Web site images presented side by side was a fraudulent phishing site, VeriSign explains

BOSTON, MA--(Marketwire - June 15, 2009) - Internet Retailer Conference & Expo, Booth #1043 - A YouGov survey* commissioned by VeriSign, Inc. (NASDAQ: VRSN) has revealed that 88 percent of Web users in the United States are at risk from online fraud because they can't identify the different forms of phishing currently happening online.

The research asked each respondent to identify which of two Web site images presented side by side was a fraudulent phishing site. The most frequently missed "tell tale" indicator was the misspelling on the site, with 88 percent failing to spot the spelling mistakes that would have identified the phishing site. The other such tell tale indicators respondents failed to spot include:

-- No padlock symbol in the browser address bar -- 68 percent duped -- URL containing unspecified, numerical, domain name -- 42 percent duped -- Unnecessary request for additional account information -- 33 percent duped

"In today's economic environment, businesses have a hard enough time competing without having to battle fraudulent, look-alike phishing sites," said Craig Spiezle, executive director of the Online Trust Alliance. "Just one phishing attack can dramatically diminish the relationship an online business has built with its customers. For these businesses, the stakes are enormous."

Phishing scams and online fraud have created doubt and concern among online shoppers. To regain their trust, site owners need an easy, reliable way to show customers that their transactions are secure -- and that they are who they say they are. Security vendors and Internet browsers have combined forces to establish the Extended Validation (EV) standard for SSL Certificates. With this technology, the browser and certificate authority control the display, making it difficult for phishers and counterfeiters to hijack a brand and its customers.

"With nine out of 10 people in the U.S. vulnerable to phishing scams, a method for easily identifying a genuine site from a phishing site is a must for all businesses online," said Tim Callan, vice president of product marketing at VeriSign. "By adopting Extended Validation, a site owner makes it easy for Web users to see that the site they are on is genuine. When a Web user visits a site secured in this way, a high-security browser will trigger the address bar to turn green. For additional clarity, the name of the organization listed in the certificate as well as the certificate's security vendor is also displayed."

"We were blown away by the impact our EV SSL Certificate had on our company; an 87 percent higher registration rate is tremendous," said Darren Shafae, founder and vice president of Paper-Check.com. "It's one thing to encrypt transmissions online, but quite another thing to assure customers that the recipient is the intended party and not an impostor. And that's just what the EV SSL green address bar signifies."

Phishing, a nationwide issue

Of the seven countries included in the research -- the United States, Germany, Sweden, Australia, India, Denmark and the United Kingdom -- the United States is the least likely to identify the tell tale signs of a phishing site that were tested for in the survey. In addition, the United States is the only country where the youngest section of the population, those between 18 and 24, is the least likely age group to identify a phishing site.

Knowledge is key to fighting phishing. To this end, VeriSign has compiled its Top five tips to distinguish a real site from a phishing site.

Consumers should check whether or not a site is genuine and whether it is taking measures to protect their personal details by looking for the following:

1. https:// in the URL: The "s" in https:// means the site is encrypted, so the information you enter is secured. While some phishing sites do have a secured Web address, many do not. Therefore, site visitors should be on the lookout for missing security on sites that should have it. 2. The padlock icon: To be meaningful, this icon must appear in the actual browser interface and not inside the content of the page itself. 3. Trust marks: Simple visual cues in the form of popular logos can show that a Web site is authenticated and secured, and that a company is reputable. 4. Check the Web address: Be suspicious of any site with an unknown domain that contains the name of a well known site in the latter part of the Web address. 5. Green address bar: Signifies that a site has undergone extensive identity authentication so that you can be confident it is the site it claims to be.

Take the Phish or No Phish Challenge yourself at www.phish-no-phish.com or visit Booth #1043 at the Internet Retailer Conference & Expo for a live demonstration.

The online survey was commissioned by VeriSign and conducted by YouGov on May 20-22, 2009. 1,015 U.S. adults (aged 18+) were polled in the sample.

About VeriSign

VeriSign, Inc. (NASDAQ: VRSN) is the trusted provider of Internet infrastructure services for the networked world. Billions of times each day, VeriSign helps companies and consumers all over the world engage in communications and commerce with confidence. Additional news and information about the company is available at www.verisign.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10694
PUBLISHED: 2019-12-12
The express install, which is the suggested way to install Puppet Enterprise, gives the user a URL at the end of the install to set the admin password. If they do not use that URL, there is an overlooked default password for the admin user. This was resolved in Puppet Enterprise 2019.0.3 and 2018.1....
CVE-2019-10695
PUBLISHED: 2019-12-12
When using the cd4pe::root_configuration task to configure a Continuous Delivery for PE installation, the root user�s username and password were exposed in the job�s Job Details pane in the PE console. These issues have been resolved in version 1.2.1 of the ...
CVE-2019-5085
PUBLISHED: 2019-12-12
An exploitable code execution vulnerability exists in the DICOM packet-parsing functionality of LEADTOOLS libltdic.so, version 20.0.2019.3.15. A specially crafted packet can cause an integer overflow, resulting in heap corruption. An attacker can send a packet to trigger this vulnerability.
CVE-2019-5090
PUBLISHED: 2019-12-12
An exploitable information disclosure vulnerability exists in the DICOM packet-parsing functionality of LEADTOOLS libltdic.so, version 20.0.2019.3.15. A specially crafted packet can cause an out-of-bounds read, resulting in information disclosure. An attacker can send a packet to trigger this vulner...
CVE-2019-5091
PUBLISHED: 2019-12-12
An exploitable denial-of-service vulnerability exists in the Dicom-packet parsing functionality of LEADTOOLS libltdic.so version 20.0.2019.3.15. A specially crafted packet can cause an infinite loop, resulting in a denial of service. An attacker can send a packet to trigger this vulnerability.