{"id":85644,"date":"2018-12-09T18:42:59","date_gmt":"2018-12-10T02:42:59","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/?p=85644"},"modified":"2018-12-28T17:06:34","modified_gmt":"2018-12-29T01:06:34","slug":"the-rise-of-hacking-and-phishing-in-2018-where-are-we-headed","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2018\/12\/the-rise-of-hacking-and-phishing-in-2018-where-are-we-headed","title":{"rendered":"The Rise of Hacking and Phishing in 2018 \u2014 Where Are We Headed?"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Recent studies show that<\/span><a href=\"https:\/\/blog.knowbe4.com\/phishing-warning-one-in-every-one-hundred-emails-is-now-a-hacking-attempt\"> <span style=\"font-weight: 400\">1 out of every 100 emails<\/span><\/a><span style=\"font-weight: 400\"> sent globally has malicious intent. <\/span><\/p>\n<p><span style=\"font-weight: 400\">This is one of the many statistics that illustrate the rise in hacking and phishing. The subject of phishing, in particular, has played big roles and some of the largest data breaches recently. <\/span><\/p>\n<p><span style=\"font-weight: 400\">An example of this would be the<\/span><a href=\"https:\/\/www.riskbasedsecurity.com\/2014\/12\/a-breakdown-and-analysis-of-the-december-2014-sony-hack\/\"> <span style=\"font-weight: 400\">2014 Sony Pictures breach<\/span><\/a><span style=\"font-weight: 400\"> perpetrated is to be believed by North Korea per the US Department of Justice. in this instance, it only took one email being opened by an employee to provide malicious actors a way to take control of Sony\u2019s network.<\/span><\/p>\n<p><span style=\"font-weight: 400\">A common thing we see among phishing attacks is impersonating an actual employee inside of the business. Some Phishing messages have even been reported as coming from the CEO of the company and play off of existing relationships to convince the victim to part with confidential information. <\/span><\/p>\n<p><span style=\"font-weight: 400\">Phishing attacks don\u2019t just happen on traditional computers but also mobile devices as well.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Even more modern security measures<\/span><a href=\"https:\/\/www.securenvoy.com\/en-gb\/two-factor-authentication\/what-is-2fa\"> <span style=\"font-weight: 400\">such as two-factor authentication<\/span><\/a><span style=\"font-weight: 400\"> can also be targeted by phishing. The hackers of today are able to create fake login pages to get the information of a target and then use that information to access the actual website. <\/span><\/p>\n<p><span style=\"font-weight: 400\">So why isn\u2019t 2-step verification good? Why doesn\u2019t it work? When the victim is prompted for 2-step Verification they also enter the verification number on the fake login page, thus giving the attacker complete access.<\/span><\/p>\n<h3><span style=\"font-weight: 400\">A Rise In Hacking &amp; Phishing Attempts<\/span><\/h3>\n<p><span style=\"font-weight: 400\">A series of industry reports demonstrates the growing trend of hacking and phishing attempts in recent years.<\/span><\/p>\n<p><span style=\"font-weight: 400\">According to PhishMe\u2019s <\/span><i><span style=\"font-weight: 400\">Enterprise Phishing Resiliency and Defense Report<\/span><\/i><span style=\"font-weight: 400\">, phishing attempts<\/span><a href=\"https:\/\/cofense.com\/wp-content\/uploads\/2017\/11\/Enterprise-Phishing-Resiliency-and-Defense-Report-2017.pdf\"> <span style=\"font-weight: 400\">have increased 65%<\/span><\/a><span style=\"font-weight: 400\"> from the previous year.<\/span><\/p>\n<div class=\"more-link-wrapper\"> <a class=\"more-link\" href=\"https:\/\/lifeboat.com\/blog\/2018\/12\/the-rise-of-hacking-and-phishing-in-2018-where-are-we-headed\">Continue reading \u201cThe Rise of Hacking and Phishing in 2018 \u2014 Where Are We Headed?\u201d | &gt;<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Recent studies show that 1 out of every 100 emails sent globally has malicious intent. This is one of the many statistics that illustrate the rise in hacking and phishing. The subject of phishing, in particular, has played big roles and some of the largest data breaches recently. An example of this would be the [\u2026]<\/p>\n","protected":false},"author":503,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-85644","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/85644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/503"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=85644"}],"version-history":[{"count":2,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/85644\/revisions"}],"predecessor-version":[{"id":86207,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/85644\/revisions\/86207"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=85644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=85644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=85644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}