• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

UK Consumers Lose Faith in ‘Phished’ Brands

November 27, 2007

Views: 4,736

[ad]

It seems Phishing is have effects in ways that weren’t originally obvious, it comes back to the same topic we generally discuss here when it comes to security and consumers.

IGNORANCE.

Someone consumers see a Phishing attempt from ‘Brand X‘ as a negative against that brand…even though it has absolutely nothing to do with the brand and there’s nothing they can do to control it.

Email phishing attacks tarnish the reputations of targeted firms, according to a new UK survey. Two in five UK adults (42 per cent) quizzed feel that their trust in a brand would be “greatly reduced” if they received a phishing email purporting to represent it.

Despite this, the majority of respondents to YouGov’s online survey reckon the responsibility for protection against phishing attacks lies with ISPs and individuals themselves, rather than the brands targeted by fraudulent emails.

One in four (26 per cent) of 1,960 adults surveyed reckon the main responsibility for protecting against phishing attacks lies with themselves, with a similar percentage (23 per cent) responding that their ISP ought to bear the brunt of filtering spam emails. A further (17 per cent) think the sender’s ISP and email service provider holds the greatest responsibility in combating scam emails.

Pretty sad news for any big brands, and how did people work out it’s the ISP’s responsibility? If you are careful with your e-mail address and responsible about using it (or at least maintain segregated and throw-away accounts) you shouldn’t have any problems anyway.

Plus believing Phishing e-mails? Sometimes I lose faith in the human race.

The YouGov phishing survey was sponsored by anti-spam firm Cloudmark, which reports that .uk domains are the single most common target of phishing attack across Europe.

Security experts at ISPs said it was unfair for consumers to hold the targets of attacks responsible for the crud hitting their inboxes.

“Whilst awareness to the problem is essential, it is unrealistic to expect businesses to be able to secure themselves fully against such sophisticated criminal activities. The increasingly dynamic and transient nature of the latest threats requires a combination of desktop protection at the client level, and accurate message filtering from ISPs,” said Nigel Stevens, product director at THUS.

Oh well I guess we just have to keep educating, talking, discussing and teaching. There’s nothing much else we can do to combat misconceptions and public opinion.

Source: The Register

Related Posts:

  • Privacy Implications of Web 3.0 and Darknets
  • An Introduction To Web Application Security Systems
  • Should US Border Cops Need a Warrant To Search Devices?
  • Critical Remote Root Zero-Day In FireEye Appliances
  • Telegram Hack - Possible Nation State Attack By Iran
  • What You Need To Know About KRACK WPA2 Wi-Fi Attack
Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Phishing, Spammers & Scammers Tagged With: Phishing, scammers, spam, spamming



Reader Interactions

Comments

  1. Nobody_Holme says

    November 27, 2007 at 12:55 pm

    “Sometimes I lose faith in the human race”

    I lost that a long time ago… But throwaways arent a perfect solution. I’m careful and use them, and only give my real email to people i trust, but I’m still on two of the spam lists…

    I do have to mention, some companies are no help, if theres a rash of phishing going round using their name, they should at least contact their customers.
    I got hit with a very very convincing one from paypal… which i dont use… so i emailed their customer support suggesting that they mention about it… and got told to fuck off, although it took them about 100 words.
    I’m not saying that the whole problem is their fault, but they should at least do their bit, after all, if their customers get all their money taken, they’ve got nobody to buy their stuff.

  2. Pantagruel says

    November 27, 2007 at 3:03 pm

    “Oh well I guess we just have to keep educating, talking, discussing and teaching. There

  3. dirty says

    November 27, 2007 at 5:18 pm

    I think this goes to show how truly uneducated most people on the internet are. I agree that the companies should be doing there part to negate these phising sites but it really comes down to the end users clicking and typing.

    When I was reading this it made me do one of those wide eyed head shaking double takes at the screen. I agree with you Pantagruel, there is no patch for human stupidity.

    ahhhhhhhhhhhhhhh!

  4. Goodpeople says

    November 30, 2007 at 11:53 am

    Well, I sort of understand why people react this way. When a company’s name is being abused in a fishing attack and the new spreads, people will start to associate that company’s name with “danger”.

    The prase “Something fishy going down”. comes to mind. Sorry for the lame attempt of humor.

    I don’t think it’s stupid. You can’t really blame people. But sooner or later they’ll realise that every company will become a taget sometime and that they just can’t keep avoiding it.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

TREVORspray - Credential Spray Toolkit for Azure, Okta, OWA & More

TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More

Views: 237

TREVORspray is a purpose-built password spraying utility designed for red teams and offensive … ...More about TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More

Force Push Scanner - Hunt GitHub Dangling Commits for Leaked Secrets

Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets

Views: 303

Force Push Scanner is an offensive security tool that identifies secrets inadvertently left in … ...More about Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets

Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends

Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends

Views: 3,546

Darknet marketplaces remain central to illicit trade in 2025, with evolving business models, payment … ...More about Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends

Caracal - Rust eBPF Rootkit for Stealthy Post-Exploitation

Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation

Views: 493

Caracal is a new Rust-based eBPF (extended Berkeley Packet Filter) rootkit that provides a stealth … ...More about Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation

Windows_EndPoint_Audit - Endpoint Security Auditing Toolkit

Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit

Views: 550

Windows_EndPoint_Audit from ITAuditMaverick introduces a powerful method for offensive security … ...More about Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit

Malvertising and TDS Cloaking Tactics Uncovered

Malvertising and TDS Cloaking Tactics Uncovered

Views: 384

As digital advertising continues to be exploited by malicious actors, malvertising and Traffic … ...More about Malvertising and TDS Cloaking Tactics Uncovered

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (2)
  • Countermeasures (231)
  • Cryptography (84)
  • Dark Web (1)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (432)
  • Forensics (65)
  • GenAI (4)
  • Hacker Culture (9)
  • Hacking News (230)
  • Hacking Tools (688)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (240)
  • Networking Hacking Tools (353)
  • Password Cracking Tools (105)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (236)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (170)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,332,628)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,350)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,838)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,808)
  • Password List Download Best Word List – Most Common Passwords (933,799)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,468)
  • Hack Tools/Exploits (673,469)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,456)

Search

Recent Posts

  • TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More July 14, 2025
  • Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets July 11, 2025
  • Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends July 9, 2025
  • Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation July 7, 2025
  • Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit July 4, 2025
  • Malvertising and TDS Cloaking Tactics Uncovered July 2, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy