{"id":18250,"date":"2018-06-07T08:00:04","date_gmt":"2018-06-07T12:00:04","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=18250"},"modified":"2022-04-27T15:16:26","modified_gmt":"2022-04-27T19:16:26","slug":"learn-the-psychology-of-digital-fraud","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/learn-the-psychology-of-digital-fraud\/","title":{"rendered":"Learn the Psychology of Digital Fraud"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Hackers are merely another type of con person, they might be armed with a computer, some tech know how, and advanced software skills, but their final goal is to manipulate you. If you play into the hands of a hacker, they can extract information they want from you for financial gain. When a machine has a security loophole we blame the programmers, but when your mind and vulnerability has been toyed with, who is to blame? Let\u2019s look at a few <\/span><a href=\"https:\/\/www.itgovernance.co.uk\/blog\/the-psychology-behind-phishing-attacks\/\"><span style=\"font-weight: 400;\">methods hackers might use<\/span><\/a><span style=\"font-weight: 400;\"> to manipulate your actions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While you focus on ensuring that a hacker doesn\u2019t manipulate your trust, your mobile device is still vulnerable to cyber attacks. Available for Android devices, dfndr security offers antivirus capabilities that scans and removes malware, and an anti-hacking feature that warns you if a link is dangerous. A quick download will go a long way towards making you feel safer.<\/span><\/p>\n<p><center><a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=MKT_BLOG_US&amp;c=psychology_digital_fraud\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18755 size-full\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2018\/05\/CTA_EN_dfndr_security_01.png\" alt=\"\" width=\"435\" height=\"57\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2018\/05\/CTA_EN_dfndr_security_01.png 435w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2018\/05\/CTA_EN_dfndr_security_01-300x39.png 300w\" sizes=\"auto, (max-width: 435px) 100vw, 435px\" \/><\/a><\/center>&nbsp;<\/p>\n<p><center><\/center><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/phishing-attacks-occur\/\"><b>Where Do Most Phishing Attacks Occur and Why?<\/b><\/a><\/p>\n<p><b>Targeting Your Stressors<br \/>\n<\/b><span style=\"font-weight: 400;\">One psychological technique that\u2019s used to manipulate is to target someone who is under stress and likely feeling vulnerable. When we\u2019re stressed, we tend to make rash decisions to push away the source of stress. This might include a situation like receiving an email asking you to send password information to your \u2018IT department\u2019 because it\u2019s \u2018urgent.\u2019 No matter what\u2019s going on around you, be sure to take a deep breath and handle tasks with your full attention. Why? That email from IT could be a scam. <\/span><\/p>\n<p><b>Email From the Big Boss<br \/>\n<\/b><span style=\"font-weight: 400;\">We tend to <\/span><a href=\"https:\/\/nature.berkeley.edu\/ucce50\/ag-labor\/7article\/article35.htm\"><span style=\"font-weight: 400;\">bow to pressure in the face of authority<\/span><\/a><span style=\"font-weight: 400;\"> quite easily; this basic psychological idea has been showcased in psychology tests as far back as the 1960s &#8211; and it\u2019s just as relevant today. If you see an email from your boss, you\u2019re more likely to address the request quickly. However, always <\/span><a href=\"https:\/\/www.psafe.com\/en\/blog\/exercise-caution-opening-emails\/\"><span style=\"font-weight: 400;\">double check that email<\/span><\/a><span style=\"font-weight: 400;\"> to ensure it isn\u2019t fraudulent. Your boss will thank you for preventing a possible phishing attack.<\/span><\/p>\n<p><b>Respond Quickly or Else<br \/>\n<\/b><span style=\"font-weight: 400;\">Lastly is the psychological manipulation of placing a time limit on your decision-making capabilities. We\u2019ve seen the tactic used in both phishing scams and television commercials &#8211; you need to act now before time runs out! Don\u2019t allow anyone to control how fast you move, caving in can tear down your ability to rationalize. The next time you see an email that stresses urgency, slow down, and take the time to consider the proposal &#8211; your future self who doesn\u2019t get hacked will be grateful.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers do more than steal your data, they also play mind games to obtain their goals. Learn their dirty tricks and how to avoid them.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[259,218,358,545,249],"class_list":["post-18250","post","type-post","status-publish","format-standard","hentry","category-security","tag-hackers","tag-privacy","tag-protection","tag-safety","tag-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=18250"}],"version-history":[{"count":6,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18250\/revisions"}],"predecessor-version":[{"id":19312,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18250\/revisions\/19312"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=18250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=18250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=18250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}