O: Hada de recursos de Seguridad Digital

O: Hada de recursos de Seguridad Digital

1078 bookmarks
Newest
We've All Been Wrong: Phishing Training Doesn't Work
We've All Been Wrong: Phishing Training Doesn't Work
The overwhelming majority of cyberattacks do occur due to some form of human error: an unwisely clicked link, a weak password, etc.
a team of 10 researchers from the University of Chicago, the University of California San Diego (UCSD), and UCSD Health performed a study of unprecedented scale in the cybersecurity industry. Over an eight month period in 2023, they studied the effects of phishing training on 19,789 personnel at UCSD Health, a large healthcare organization.
The intuitive sense behind the idea makes it extra compelling and may explain why it persists despite rigorous recent evidence to the contrary.
'We just need to make users aware.
the tips did not improve employees' ability to suss out real-life phishing emails. In fact, it actually had an unexpectedly regressive side effect: for having been exposed to the training, employees reported feeling safer online, seeing that their company was investing in cyber protections. Ironically, they ended up more likely to fall for bad emails.
Besides annual phishing courses, they examined four kinds of embedded training:
Static Web pages, developed by Proofpoint, with general tips on how to avoid phishing attacks
Interactive pages, with generalized Q&A exercises also sourced from Proofpoint's library
Static pages customized to the particular phishing email the employee had just fallen for
companies that deploy the most effective training courses available can expect a quarter of their employees to improve around 20%.
Static training demonstrated no benefit whatsoever, in no small part because employees simply weren't engaged.
Ironically, employees who completed multiple static training sessions became 18.5% more likely to fall for a phishing email.
The discouraging data piles on from there. Annual training is presumed to refresh employees' ability to fight bad emails, but the study found no such relationship — employees were approximately as likely to click a bad link one month after their course as they were after more than a year.
convincing phishing emails tricked even the most highly trained, best-performing employees more than 15% of the time, meaning that one well-crafted email can totally negate any benefits of any training at any company with more than a handful of employees.
What Now for Anti-Phishing Efforts?
With training we're saying: 'Hey, you are responsible, you need to learn.
Her study leaves open the possibility that certain, unexplored kinds of training could work, like more expensive, one-on-one in-person coaching.
"We're just saying the current methods aren't working."
·darkreading.com·
We've All Been Wrong: Phishing Training Doesn't Work
Las autoridades fronterizas de EE UU están ordenando tecnologías para buscar datos en celulares
Las autoridades fronterizas de EE UU están ordenando tecnologías para buscar datos en celulares
Qué funciones contempla Cellebrite
clasificar imágenes en función de si contienen determinados elementos, como joyas, escritura a mano o documentos.
examinar mensajes de texto directos en aplicaciones como TikTok, y filtrar mensajes que mencionen determinados temas
desvelar fotos "ocultas" por el propietario de un dispositivo
hacer mapas sociales de amigos y contactos
trazar las ubicaciones a las que una persona envió mensajes de texto.
La compañía lanzó en febrero una herramienta que permite a los clientes utilizar IA para resumir registros de chat y audio de teléfonos
"No aprobamos el uso de las soluciones de Cellebrite para acceder a la información personal de periodistas, activistas u otras personas que trabajan en contra de los intereses de regímenes represivos y hacerlo fuera de los límites de una investigación legalmente sancionada viola expresamente los términos de nuestros acuerdos de licencia", reza la página de Cellebrite.
Si una persona se niega a entregar su contraseña, los ciudadanos estadounidenses pueden permanecer bajo custodia temporalmente, pero no se les puede denegar la entrada. Sin embargo, a los no ciudadanos sí se les puede denegar la entrada si se niegan.
De los aproximadamente 47,000 registros de dispositivos que la Patrulla de Aduanas y Fronteras llevó a cabo en 2024, unos 4,200 de ellos fueron registros avanzados.
El Servicio de Aduanas tiene derecho a retener un teléfono durante varios días para llevar a cabo una búsqueda avanzada, pero si la agencia cita "circunstancias atenuantes", podría tener el teléfono durante semanas o meses.
·es.wired.com·
Las autoridades fronterizas de EE UU están ordenando tecnologías para buscar datos en celulares